Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2022-1927
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T00:17:00.945Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", }, { tags: [ "x_transferred", ], url: "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010", }, { name: "FEDORA-2022-5ce148636b", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/", }, { name: "FEDORA-2022-d94440bf0e", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/", }, { name: "FEDORA-2022-bb2daad935", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/", }, { name: "GLSA-202208-32", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/202208-32", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT213488", }, { name: "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { name: "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { name: "GLSA-202305-16", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/202305-16", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "vim/vim", vendor: "vim", versions: [ { lessThan: "8.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-126", description: "CWE-126 Buffer Over-read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-05-03T00:00:00", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", }, { url: "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010", }, { name: "FEDORA-2022-5ce148636b", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/", }, { name: "FEDORA-2022-d94440bf0e", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/", }, { name: "FEDORA-2022-bb2daad935", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/", }, { name: "GLSA-202208-32", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/202208-32", }, { url: "https://support.apple.com/kb/HT213488", }, { name: "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { name: "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { name: "GLSA-202305-16", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/202305-16", }, ], source: { advisory: "945107ef-0b27-41c7-a03c-db99def0e777", discovery: "EXTERNAL", }, title: "Buffer Over-read in vim/vim", }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-1927", datePublished: "2022-05-29T00:00:00", dateReserved: "2022-05-28T00:00:00", dateUpdated: "2024-08-03T00:17:00.945Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2022-1927\",\"sourceIdentifier\":\"security@huntr.dev\",\"published\":\"2022-05-29T14:15:08.047\",\"lastModified\":\"2024-11-21T06:41:46.120\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer Over-read in GitHub repository vim/vim prior to 8.2.\"},{\"lang\":\"es\",\"value\":\"Una lectura excesiva del Búfer en el repositorio de GitHub vim/vim versiones anteriores a 8.2\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-126\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2.5037\",\"matchCriteriaId\":\"2679F4D1-14EF-47D7-B7B7-2AAA1CF3FE61\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.0\",\"matchCriteriaId\":\"71E032AD-F827-4944-9699-BB1E6D4233FC\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/28\",\"source\":\"security@huntr.dev\"},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/41\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010\",\"source\":\"security@huntr.dev\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777\",\"source\":\"security@huntr.dev\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/\",\"source\":\"security@huntr.dev\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/\",\"source\":\"security@huntr.dev\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/\",\"source\":\"security@huntr.dev\"},{\"url\":\"https://security.gentoo.org/glsa/202208-32\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202305-16\",\"source\":\"security@huntr.dev\"},{\"url\":\"https://support.apple.com/kb/HT213488\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/28\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/41\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202208-32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202305-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/kb/HT213488\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
RHSA-2022:5813
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for vim is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Out-of-bounds Write (CVE-2022-1785)\n\n* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)\n\n* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:5813", url: "https://access.redhat.com/errata/RHSA-2022:5813", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "2088689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2088689", }, { category: "external", summary: "2091682", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091682", }, { category: "external", summary: "2091687", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091687", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5813.json", }, ], title: "Red Hat Security Advisory: vim security update", tracking: { current_release_date: "2024-11-22T19:39:08+00:00", generator: { date: "2024-11-22T19:39:08+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:5813", initial_release_date: "2022-08-03T13:51:05+00:00", revision_history: [ { date: "2022-08-03T13:51:05+00:00", number: "1", summary: "Initial version", }, { date: "2022-08-03T13:51:05+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T19:39:08+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Virtualization 4 Hypervisor for RHEL 8", product: { name: "Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4", product_identification_helper: { cpe: "cpe:/o:redhat:rhev_hypervisor:4.4::el8", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 8)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:8::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-common-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-common-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", product: { name: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", product_id: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/vim-filesystem@8.0.1763-19.el8_6.4?arch=noarch&epoch=2", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "vim-2:8.0.1763-19.el8_6.4.src", product: { name: "vim-2:8.0.1763-19.el8_6.4.src", product_id: "vim-2:8.0.1763-19.el8_6.4.src", product_identification_helper: { purl: "pkg:rpm/redhat/vim@8.0.1763-19.el8_6.4?arch=src&epoch=2", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.4.src", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.4.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.4.src", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.4.src", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, ], }, vulnerabilities: [ { cve: "CVE-2022-1785", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-20T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2088689", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to an out-of-bounds write vulnerability in the ex_cmds function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Out-of-bounds Write", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1785", }, { category: "external", summary: "RHBZ#2088689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2088689", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1785", url: "https://www.cve.org/CVERecord?id=CVE-2022-1785", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1785", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1785", }, { category: "external", summary: "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109", url: "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109", }, ], release_date: "2022-05-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-03T13:51:05+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5813", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H", version: "3.1", }, products: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Out-of-bounds Write", }, { cve: "CVE-2022-1897", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-27T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2091682", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to an out-of-bounds write vulnerability in the vim_regsub_both function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: out-of-bounds write in vim_regsub_both() in regexp.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1897", }, { category: "external", summary: "RHBZ#2091682", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091682", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1897", url: "https://www.cve.org/CVERecord?id=CVE-2022-1897", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1897", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1897", }, { category: "external", summary: "https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118", url: "https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118", }, ], release_date: "2022-05-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-03T13:51:05+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5813", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: out-of-bounds write in vim_regsub_both() in regexp.c", }, { cve: "CVE-2022-1927", cwe: { id: "CWE-126", name: "Buffer Over-read", }, discovery_date: "2022-05-29T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2091687", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to a buffer over-read vulnerability in the utf_ptr2char function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: buffer over-read in utf_ptr2char() in mbyte.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1927", }, { category: "external", summary: "RHBZ#2091687", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091687", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1927", url: "https://www.cve.org/CVERecord?id=CVE-2022-1927", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1927", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1927", }, { category: "external", summary: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", }, ], release_date: "2022-05-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-03T13:51:05+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5813", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: buffer over-read in utf_ptr2char() in mbyte.c", }, ], }
rhsa-2022_5813
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for vim is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Out-of-bounds Write (CVE-2022-1785)\n\n* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)\n\n* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:5813", url: "https://access.redhat.com/errata/RHSA-2022:5813", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "2088689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2088689", }, { category: "external", summary: "2091682", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091682", }, { category: "external", summary: "2091687", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091687", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5813.json", }, ], title: "Red Hat Security Advisory: vim security update", tracking: { current_release_date: "2024-11-22T19:39:08+00:00", generator: { date: "2024-11-22T19:39:08+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:5813", initial_release_date: "2022-08-03T13:51:05+00:00", revision_history: [ { date: "2022-08-03T13:51:05+00:00", number: "1", summary: "Initial version", }, { date: "2022-08-03T13:51:05+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T19:39:08+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Virtualization 4 Hypervisor for RHEL 8", product: { name: "Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4", product_identification_helper: { cpe: "cpe:/o:redhat:rhev_hypervisor:4.4::el8", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 8)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:8::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-common-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-common-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", product: { name: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", product_id: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/vim-filesystem@8.0.1763-19.el8_6.4?arch=noarch&epoch=2", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "vim-2:8.0.1763-19.el8_6.4.src", product: { name: "vim-2:8.0.1763-19.el8_6.4.src", product_id: "vim-2:8.0.1763-19.el8_6.4.src", product_identification_helper: { purl: "pkg:rpm/redhat/vim@8.0.1763-19.el8_6.4?arch=src&epoch=2", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.4.src", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.4.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.4.src", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.4.src", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, ], }, vulnerabilities: [ { cve: "CVE-2022-1785", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-20T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2088689", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to an out-of-bounds write vulnerability in the ex_cmds function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Out-of-bounds Write", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1785", }, { category: "external", summary: "RHBZ#2088689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2088689", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1785", url: "https://www.cve.org/CVERecord?id=CVE-2022-1785", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1785", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1785", }, { category: "external", summary: "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109", url: "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109", }, ], release_date: "2022-05-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-03T13:51:05+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5813", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H", version: "3.1", }, products: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Out-of-bounds Write", }, { cve: "CVE-2022-1897", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-27T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2091682", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to an out-of-bounds write vulnerability in the vim_regsub_both function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: out-of-bounds write in vim_regsub_both() in regexp.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1897", }, { category: "external", summary: "RHBZ#2091682", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091682", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1897", url: "https://www.cve.org/CVERecord?id=CVE-2022-1897", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1897", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1897", }, { category: "external", summary: "https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118", url: "https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118", }, ], release_date: "2022-05-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-03T13:51:05+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5813", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: out-of-bounds write in vim_regsub_both() in regexp.c", }, { cve: "CVE-2022-1927", cwe: { id: "CWE-126", name: "Buffer Over-read", }, discovery_date: "2022-05-29T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2091687", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to a buffer over-read vulnerability in the utf_ptr2char function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: buffer over-read in utf_ptr2char() in mbyte.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1927", }, { category: "external", summary: "RHBZ#2091687", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091687", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1927", url: "https://www.cve.org/CVERecord?id=CVE-2022-1927", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1927", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1927", }, { category: "external", summary: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", }, ], release_date: "2022-05-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-03T13:51:05+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5813", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: buffer over-read in utf_ptr2char() in mbyte.c", }, ], }
rhsa-2022:5813
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for vim is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Out-of-bounds Write (CVE-2022-1785)\n\n* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)\n\n* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:5813", url: "https://access.redhat.com/errata/RHSA-2022:5813", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "2088689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2088689", }, { category: "external", summary: "2091682", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091682", }, { category: "external", summary: "2091687", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091687", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5813.json", }, ], title: "Red Hat Security Advisory: vim security update", tracking: { current_release_date: "2024-11-22T19:39:08+00:00", generator: { date: "2024-11-22T19:39:08+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:5813", initial_release_date: "2022-08-03T13:51:05+00:00", revision_history: [ { date: "2022-08-03T13:51:05+00:00", number: "1", summary: "Initial version", }, { date: "2022-08-03T13:51:05+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T19:39:08+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Virtualization 4 Hypervisor for RHEL 8", product: { name: "Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4", product_identification_helper: { cpe: "cpe:/o:redhat:rhev_hypervisor:4.4::el8", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 8)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:8::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", product_id: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.4?arch=aarch64&epoch=2", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", product_id: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.4?arch=ppc64le&epoch=2", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", product_id: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.4?arch=x86_64&epoch=2", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-common-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-common-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", product: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", product_id: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-19.el8_6.4?arch=s390x&epoch=2", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", product: { name: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", product_id: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/vim-filesystem@8.0.1763-19.el8_6.4?arch=noarch&epoch=2", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "vim-2:8.0.1763-19.el8_6.4.src", product: { name: "vim-2:8.0.1763-19.el8_6.4.src", product_id: "vim-2:8.0.1763-19.el8_6.4.src", product_identification_helper: { purl: "pkg:rpm/redhat/vim@8.0.1763-19.el8_6.4?arch=src&epoch=2", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.4.src", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", product_id: "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "8Base-RHV-Hypervisor-4", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.4.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.4.src", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-19.el8_6.4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", }, product_reference: "vim-2:8.0.1763-19.el8_6.4.src", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", relates_to_product_reference: "BaseOS-8.6.0.Z.MAIN.EUS", }, ], }, vulnerabilities: [ { cve: "CVE-2022-1785", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-20T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2088689", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to an out-of-bounds write vulnerability in the ex_cmds function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Out-of-bounds Write", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1785", }, { category: "external", summary: "RHBZ#2088689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2088689", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1785", url: "https://www.cve.org/CVERecord?id=CVE-2022-1785", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1785", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1785", }, { category: "external", summary: "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109", url: "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109", }, ], release_date: "2022-05-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-03T13:51:05+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5813", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H", version: "3.1", }, products: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Out-of-bounds Write", }, { cve: "CVE-2022-1897", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-27T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2091682", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to an out-of-bounds write vulnerability in the vim_regsub_both function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: out-of-bounds write in vim_regsub_both() in regexp.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1897", }, { category: "external", summary: "RHBZ#2091682", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091682", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1897", url: "https://www.cve.org/CVERecord?id=CVE-2022-1897", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1897", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1897", }, { category: "external", summary: "https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118", url: "https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118", }, ], release_date: "2022-05-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-03T13:51:05+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5813", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: out-of-bounds write in vim_regsub_both() in regexp.c", }, { cve: "CVE-2022-1927", cwe: { id: "CWE-126", name: "Buffer Over-read", }, discovery_date: "2022-05-29T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2091687", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to a buffer over-read vulnerability in the utf_ptr2char function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: buffer over-read in utf_ptr2char() in mbyte.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1927", }, { category: "external", summary: "RHBZ#2091687", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091687", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1927", url: "https://www.cve.org/CVERecord?id=CVE-2022-1927", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1927", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1927", }, { category: "external", summary: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", }, ], release_date: "2022-05-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-03T13:51:05+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5813", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "8Base-RHV-Hypervisor-4:vim-2:8.0.1763-19.el8_6.4.src", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "AppStream-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-2:8.0.1763-19.el8_6.4.src", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-19.el8_6.4.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-19.el8_6.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-19.el8_6.4.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: buffer over-read in utf_ptr2char() in mbyte.c", }, ], }
rhsa-2022:5942
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for vim is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Out-of-bounds Write (CVE-2022-1785)\n\n* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)\n\n* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:5942", url: "https://access.redhat.com/errata/RHSA-2022:5942", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "2088689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2088689", }, { category: "external", summary: "2091682", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091682", }, { category: "external", summary: "2091687", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091687", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5942.json", }, ], title: "Red Hat Security Advisory: vim security update", tracking: { current_release_date: "2024-11-22T19:39:16+00:00", generator: { date: "2024-11-22T19:39:16+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:5942", initial_release_date: "2022-08-09T10:32:11+00:00", revision_history: [ { date: "2022-08-09T10:32:11+00:00", number: "1", summary: "Initial version", }, { date: "2022-08-09T10:32:11+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T19:39:16+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 9)", product: { name: "Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:9::appstream", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 9)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:9::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "vim-2:8.2.2637-16.el9_0.3.src", product: { name: "vim-2:8.2.2637-16.el9_0.3.src", product_id: "vim-2:8.2.2637-16.el9_0.3.src", product_identification_helper: { purl: "pkg:rpm/redhat/vim@8.2.2637-16.el9_0.3?arch=src&epoch=2", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", product: { name: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", product_id: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/vim-filesystem@8.2.2637-16.el9_0.3?arch=noarch&epoch=2", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-common-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-common-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-common-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-common-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-X11-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-X11-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-common-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-common-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-2:8.2.2637-16.el9_0.3.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", }, product_reference: "vim-2:8.2.2637-16.el9_0.3.src", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", }, product_reference: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.2.2637-16.el9_0.3.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", }, product_reference: "vim-2:8.2.2637-16.el9_0.3.src", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", }, product_reference: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, ], }, vulnerabilities: [ { cve: "CVE-2022-1785", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-20T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2088689", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to an out-of-bounds write vulnerability in the ex_cmds function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Out-of-bounds Write", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1785", }, { category: "external", summary: "RHBZ#2088689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2088689", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1785", url: "https://www.cve.org/CVERecord?id=CVE-2022-1785", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1785", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1785", }, { category: "external", summary: "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109", url: "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109", }, ], release_date: "2022-05-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-09T10:32:11+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5942", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Out-of-bounds Write", }, { cve: "CVE-2022-1897", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-27T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2091682", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to an out-of-bounds write vulnerability in the vim_regsub_both function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: out-of-bounds write in vim_regsub_both() in regexp.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1897", }, { category: "external", summary: "RHBZ#2091682", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091682", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1897", url: "https://www.cve.org/CVERecord?id=CVE-2022-1897", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1897", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1897", }, { category: "external", summary: "https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118", url: "https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118", }, ], release_date: "2022-05-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-09T10:32:11+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5942", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: out-of-bounds write in vim_regsub_both() in regexp.c", }, { cve: "CVE-2022-1927", cwe: { id: "CWE-126", name: "Buffer Over-read", }, discovery_date: "2022-05-29T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2091687", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to a buffer over-read vulnerability in the utf_ptr2char function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: buffer over-read in utf_ptr2char() in mbyte.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1927", }, { category: "external", summary: "RHBZ#2091687", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091687", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1927", url: "https://www.cve.org/CVERecord?id=CVE-2022-1927", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1927", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1927", }, { category: "external", summary: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", }, ], release_date: "2022-05-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-09T10:32:11+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5942", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: buffer over-read in utf_ptr2char() in mbyte.c", }, ], }
RHSA-2022:5942
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for vim is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Out-of-bounds Write (CVE-2022-1785)\n\n* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)\n\n* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:5942", url: "https://access.redhat.com/errata/RHSA-2022:5942", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "2088689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2088689", }, { category: "external", summary: "2091682", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091682", }, { category: "external", summary: "2091687", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091687", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5942.json", }, ], title: "Red Hat Security Advisory: vim security update", tracking: { current_release_date: "2024-11-22T19:39:16+00:00", generator: { date: "2024-11-22T19:39:16+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:5942", initial_release_date: "2022-08-09T10:32:11+00:00", revision_history: [ { date: "2022-08-09T10:32:11+00:00", number: "1", summary: "Initial version", }, { date: "2022-08-09T10:32:11+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T19:39:16+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 9)", product: { name: "Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:9::appstream", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 9)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:9::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "vim-2:8.2.2637-16.el9_0.3.src", product: { name: "vim-2:8.2.2637-16.el9_0.3.src", product_id: "vim-2:8.2.2637-16.el9_0.3.src", product_identification_helper: { purl: "pkg:rpm/redhat/vim@8.2.2637-16.el9_0.3?arch=src&epoch=2", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", product: { name: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", product_id: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/vim-filesystem@8.2.2637-16.el9_0.3?arch=noarch&epoch=2", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-common-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-common-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-common-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-common-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-X11-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-X11-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-common-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-common-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-2:8.2.2637-16.el9_0.3.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", }, product_reference: "vim-2:8.2.2637-16.el9_0.3.src", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", }, product_reference: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.2.2637-16.el9_0.3.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", }, product_reference: "vim-2:8.2.2637-16.el9_0.3.src", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", }, product_reference: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, ], }, vulnerabilities: [ { cve: "CVE-2022-1785", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-20T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2088689", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to an out-of-bounds write vulnerability in the ex_cmds function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Out-of-bounds Write", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1785", }, { category: "external", summary: "RHBZ#2088689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2088689", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1785", url: "https://www.cve.org/CVERecord?id=CVE-2022-1785", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1785", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1785", }, { category: "external", summary: "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109", url: "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109", }, ], release_date: "2022-05-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-09T10:32:11+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5942", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Out-of-bounds Write", }, { cve: "CVE-2022-1897", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-27T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2091682", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to an out-of-bounds write vulnerability in the vim_regsub_both function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: out-of-bounds write in vim_regsub_both() in regexp.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1897", }, { category: "external", summary: "RHBZ#2091682", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091682", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1897", url: "https://www.cve.org/CVERecord?id=CVE-2022-1897", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1897", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1897", }, { category: "external", summary: "https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118", url: "https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118", }, ], release_date: "2022-05-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-09T10:32:11+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5942", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: out-of-bounds write in vim_regsub_both() in regexp.c", }, { cve: "CVE-2022-1927", cwe: { id: "CWE-126", name: "Buffer Over-read", }, discovery_date: "2022-05-29T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2091687", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to a buffer over-read vulnerability in the utf_ptr2char function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: buffer over-read in utf_ptr2char() in mbyte.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1927", }, { category: "external", summary: "RHBZ#2091687", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091687", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1927", url: "https://www.cve.org/CVERecord?id=CVE-2022-1927", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1927", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1927", }, { category: "external", summary: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", }, ], release_date: "2022-05-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-09T10:32:11+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5942", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: buffer over-read in utf_ptr2char() in mbyte.c", }, ], }
rhsa-2022_5942
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for vim is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Out-of-bounds Write (CVE-2022-1785)\n\n* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)\n\n* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:5942", url: "https://access.redhat.com/errata/RHSA-2022:5942", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "2088689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2088689", }, { category: "external", summary: "2091682", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091682", }, { category: "external", summary: "2091687", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091687", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5942.json", }, ], title: "Red Hat Security Advisory: vim security update", tracking: { current_release_date: "2024-11-22T19:39:16+00:00", generator: { date: "2024-11-22T19:39:16+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:5942", initial_release_date: "2022-08-09T10:32:11+00:00", revision_history: [ { date: "2022-08-09T10:32:11+00:00", number: "1", summary: "Initial version", }, { date: "2022-08-09T10:32:11+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T19:39:16+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 9)", product: { name: "Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:9::appstream", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 9)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:9::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "vim-2:8.2.2637-16.el9_0.3.src", product: { name: "vim-2:8.2.2637-16.el9_0.3.src", product_id: "vim-2:8.2.2637-16.el9_0.3.src", product_identification_helper: { purl: "pkg:rpm/redhat/vim@8.2.2637-16.el9_0.3?arch=src&epoch=2", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", product: { name: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", product_id: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/vim-filesystem@8.2.2637-16.el9_0.3?arch=noarch&epoch=2", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-common-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-common-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.3?arch=aarch64&epoch=2", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.3?arch=ppc64le&epoch=2", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-common-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-common-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.3?arch=x86_64&epoch=2", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-X11-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-X11-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-common-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-common-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", product: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", product_id: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.3?arch=s390x&epoch=2", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-2:8.2.2637-16.el9_0.3.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", }, product_reference: "vim-2:8.2.2637-16.el9_0.3.src", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", }, product_reference: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", product_id: "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "AppStream-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.2.2637-16.el9_0.3.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", }, product_reference: "vim-2:8.2.2637-16.el9_0.3.src", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-X11-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-common-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", }, product_reference: "vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", product_id: "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", relates_to_product_reference: "BaseOS-9.0.0.Z.MAIN.EUS", }, ], }, vulnerabilities: [ { cve: "CVE-2022-1785", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-20T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2088689", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to an out-of-bounds write vulnerability in the ex_cmds function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Out-of-bounds Write", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1785", }, { category: "external", summary: "RHBZ#2088689", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2088689", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1785", url: "https://www.cve.org/CVERecord?id=CVE-2022-1785", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1785", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1785", }, { category: "external", summary: "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109", url: "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109", }, ], release_date: "2022-05-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-09T10:32:11+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5942", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Out-of-bounds Write", }, { cve: "CVE-2022-1897", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-05-27T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2091682", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to an out-of-bounds write vulnerability in the vim_regsub_both function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: out-of-bounds write in vim_regsub_both() in regexp.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1897", }, { category: "external", summary: "RHBZ#2091682", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091682", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1897", url: "https://www.cve.org/CVERecord?id=CVE-2022-1897", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1897", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1897", }, { category: "external", summary: "https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118", url: "https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118", }, ], release_date: "2022-05-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-09T10:32:11+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5942", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: out-of-bounds write in vim_regsub_both() in regexp.c", }, { cve: "CVE-2022-1927", cwe: { id: "CWE-126", name: "Buffer Over-read", }, discovery_date: "2022-05-29T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2091687", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access and leads to a buffer over-read vulnerability in the utf_ptr2char function. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: buffer over-read in utf_ptr2char() in mbyte.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-1927", }, { category: "external", summary: "RHBZ#2091687", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091687", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-1927", url: "https://www.cve.org/CVERecord?id=CVE-2022-1927", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-1927", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1927", }, { category: "external", summary: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", }, ], release_date: "2022-05-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-08-09T10:32:11+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:5942", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.3.src", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.3.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: buffer over-read in utf_ptr2char() in mbyte.c", }, ], }
opensuse-su-2024:12337-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "gvim-9.0.0453-2.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the gvim-9.0.0453-2.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-12337", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12337-1.json", }, { category: "self", summary: "SUSE CVE CVE-2021-46059 page", url: "https://www.suse.com/security/cve/CVE-2021-46059/", }, { category: "self", summary: "SUSE CVE CVE-2022-0213 page", url: "https://www.suse.com/security/cve/CVE-2022-0213/", }, { category: "self", summary: "SUSE CVE CVE-2022-0261 page", url: "https://www.suse.com/security/cve/CVE-2022-0261/", }, { category: "self", summary: "SUSE CVE CVE-2022-0318 page", url: "https://www.suse.com/security/cve/CVE-2022-0318/", }, { category: "self", summary: "SUSE CVE CVE-2022-0319 page", url: "https://www.suse.com/security/cve/CVE-2022-0319/", }, { category: "self", summary: "SUSE CVE CVE-2022-0351 page", url: "https://www.suse.com/security/cve/CVE-2022-0351/", }, { category: "self", summary: "SUSE CVE CVE-2022-0359 page", url: "https://www.suse.com/security/cve/CVE-2022-0359/", }, { category: "self", summary: "SUSE CVE CVE-2022-0361 page", url: "https://www.suse.com/security/cve/CVE-2022-0361/", }, { category: "self", summary: "SUSE CVE CVE-2022-0368 page", url: "https://www.suse.com/security/cve/CVE-2022-0368/", }, { category: "self", summary: "SUSE CVE CVE-2022-0392 page", url: "https://www.suse.com/security/cve/CVE-2022-0392/", }, { category: "self", summary: "SUSE CVE CVE-2022-0407 page", url: "https://www.suse.com/security/cve/CVE-2022-0407/", }, { category: "self", summary: "SUSE CVE CVE-2022-0408 page", url: "https://www.suse.com/security/cve/CVE-2022-0408/", }, { category: "self", summary: "SUSE CVE CVE-2022-0413 page", url: "https://www.suse.com/security/cve/CVE-2022-0413/", }, { category: "self", summary: "SUSE CVE CVE-2022-0554 page", url: "https://www.suse.com/security/cve/CVE-2022-0554/", }, { category: "self", summary: "SUSE CVE CVE-2022-0572 page", url: "https://www.suse.com/security/cve/CVE-2022-0572/", }, { category: "self", summary: "SUSE CVE CVE-2022-0629 page", url: "https://www.suse.com/security/cve/CVE-2022-0629/", }, { category: "self", summary: "SUSE CVE CVE-2022-0685 page", url: "https://www.suse.com/security/cve/CVE-2022-0685/", }, { category: "self", summary: "SUSE CVE CVE-2022-0729 page", url: "https://www.suse.com/security/cve/CVE-2022-0729/", }, { category: "self", summary: "SUSE CVE CVE-2022-0943 page", url: "https://www.suse.com/security/cve/CVE-2022-0943/", }, { category: "self", summary: "SUSE CVE CVE-2022-1154 page", url: "https://www.suse.com/security/cve/CVE-2022-1154/", }, { category: "self", summary: "SUSE CVE CVE-2022-1160 page", url: "https://www.suse.com/security/cve/CVE-2022-1160/", }, { category: "self", summary: "SUSE CVE CVE-2022-1420 page", url: "https://www.suse.com/security/cve/CVE-2022-1420/", }, { category: "self", summary: "SUSE CVE CVE-2022-1616 page", url: "https://www.suse.com/security/cve/CVE-2022-1616/", }, { category: "self", summary: "SUSE CVE CVE-2022-1619 page", url: "https://www.suse.com/security/cve/CVE-2022-1619/", }, { category: "self", summary: "SUSE CVE CVE-2022-1620 page", url: "https://www.suse.com/security/cve/CVE-2022-1620/", }, { category: "self", summary: "SUSE CVE CVE-2022-1621 page", url: "https://www.suse.com/security/cve/CVE-2022-1621/", }, { category: "self", summary: "SUSE CVE CVE-2022-1629 page", url: "https://www.suse.com/security/cve/CVE-2022-1629/", }, { category: "self", summary: "SUSE CVE CVE-2022-1674 page", url: "https://www.suse.com/security/cve/CVE-2022-1674/", }, { category: "self", summary: "SUSE CVE CVE-2022-1720 page", url: "https://www.suse.com/security/cve/CVE-2022-1720/", }, { category: "self", summary: "SUSE CVE CVE-2022-1733 page", url: "https://www.suse.com/security/cve/CVE-2022-1733/", }, { category: "self", summary: "SUSE CVE CVE-2022-1735 page", url: "https://www.suse.com/security/cve/CVE-2022-1735/", }, { category: "self", summary: "SUSE CVE CVE-2022-1769 page", url: "https://www.suse.com/security/cve/CVE-2022-1769/", }, { category: "self", summary: "SUSE CVE CVE-2022-1771 page", url: "https://www.suse.com/security/cve/CVE-2022-1771/", }, { category: "self", summary: "SUSE CVE CVE-2022-1785 page", url: "https://www.suse.com/security/cve/CVE-2022-1785/", }, { category: "self", summary: "SUSE CVE CVE-2022-1796 page", url: "https://www.suse.com/security/cve/CVE-2022-1796/", }, { category: "self", summary: "SUSE CVE CVE-2022-1851 page", url: "https://www.suse.com/security/cve/CVE-2022-1851/", }, { category: "self", summary: "SUSE CVE CVE-2022-1886 page", url: "https://www.suse.com/security/cve/CVE-2022-1886/", }, { category: "self", summary: "SUSE CVE CVE-2022-1897 page", url: "https://www.suse.com/security/cve/CVE-2022-1897/", }, { category: "self", summary: "SUSE CVE CVE-2022-1898 page", url: "https://www.suse.com/security/cve/CVE-2022-1898/", }, { category: "self", summary: "SUSE CVE CVE-2022-1927 page", url: "https://www.suse.com/security/cve/CVE-2022-1927/", }, { category: "self", summary: "SUSE CVE CVE-2022-1942 page", url: "https://www.suse.com/security/cve/CVE-2022-1942/", }, { category: "self", summary: "SUSE CVE CVE-2022-1968 page", url: "https://www.suse.com/security/cve/CVE-2022-1968/", }, { category: "self", summary: "SUSE CVE CVE-2022-2000 page", url: "https://www.suse.com/security/cve/CVE-2022-2000/", }, { category: "self", summary: "SUSE CVE CVE-2022-2042 page", url: "https://www.suse.com/security/cve/CVE-2022-2042/", }, { category: "self", summary: "SUSE CVE CVE-2022-2124 page", url: "https://www.suse.com/security/cve/CVE-2022-2124/", }, { category: "self", summary: "SUSE CVE CVE-2022-2125 page", url: "https://www.suse.com/security/cve/CVE-2022-2125/", }, { category: "self", summary: "SUSE CVE CVE-2022-2126 page", url: "https://www.suse.com/security/cve/CVE-2022-2126/", }, { category: "self", summary: "SUSE CVE CVE-2022-2129 page", url: "https://www.suse.com/security/cve/CVE-2022-2129/", }, { category: "self", summary: "SUSE CVE CVE-2022-2175 page", url: "https://www.suse.com/security/cve/CVE-2022-2175/", }, { category: "self", summary: "SUSE CVE CVE-2022-2182 page", url: "https://www.suse.com/security/cve/CVE-2022-2182/", }, { category: "self", summary: "SUSE CVE CVE-2022-2183 page", url: "https://www.suse.com/security/cve/CVE-2022-2183/", }, { category: "self", summary: "SUSE CVE CVE-2022-2206 page", url: "https://www.suse.com/security/cve/CVE-2022-2206/", }, { category: "self", summary: "SUSE CVE CVE-2022-2207 page", url: "https://www.suse.com/security/cve/CVE-2022-2207/", }, { category: "self", summary: "SUSE CVE CVE-2022-2208 page", url: "https://www.suse.com/security/cve/CVE-2022-2208/", }, { category: "self", summary: "SUSE CVE CVE-2022-2210 page", url: "https://www.suse.com/security/cve/CVE-2022-2210/", }, { category: "self", summary: "SUSE CVE CVE-2022-2231 page", url: "https://www.suse.com/security/cve/CVE-2022-2231/", }, { category: "self", summary: "SUSE CVE CVE-2022-2264 page", url: "https://www.suse.com/security/cve/CVE-2022-2264/", }, { category: "self", summary: "SUSE CVE CVE-2022-2284 page", url: "https://www.suse.com/security/cve/CVE-2022-2284/", }, { category: "self", summary: "SUSE CVE CVE-2022-2286 page", url: "https://www.suse.com/security/cve/CVE-2022-2286/", }, { category: "self", summary: "SUSE CVE CVE-2022-2287 page", url: "https://www.suse.com/security/cve/CVE-2022-2287/", }, { category: "self", summary: "SUSE CVE CVE-2022-2288 page", url: "https://www.suse.com/security/cve/CVE-2022-2288/", }, { category: "self", summary: "SUSE CVE CVE-2022-2289 page", url: "https://www.suse.com/security/cve/CVE-2022-2289/", }, { category: "self", summary: "SUSE CVE CVE-2022-2304 page", url: "https://www.suse.com/security/cve/CVE-2022-2304/", }, { category: "self", summary: "SUSE CVE CVE-2022-2343 page", url: "https://www.suse.com/security/cve/CVE-2022-2343/", }, { category: "self", summary: "SUSE CVE CVE-2022-2344 page", url: "https://www.suse.com/security/cve/CVE-2022-2344/", }, { category: "self", summary: "SUSE CVE CVE-2022-2345 page", url: "https://www.suse.com/security/cve/CVE-2022-2345/", }, { category: "self", summary: "SUSE CVE CVE-2022-2571 page", url: "https://www.suse.com/security/cve/CVE-2022-2571/", }, { category: "self", summary: "SUSE CVE CVE-2022-2580 page", url: "https://www.suse.com/security/cve/CVE-2022-2580/", }, { category: "self", summary: "SUSE CVE CVE-2022-2581 page", url: "https://www.suse.com/security/cve/CVE-2022-2581/", }, { category: "self", summary: "SUSE CVE CVE-2022-2598 page", url: "https://www.suse.com/security/cve/CVE-2022-2598/", }, { category: "self", summary: "SUSE CVE CVE-2022-2816 page", url: "https://www.suse.com/security/cve/CVE-2022-2816/", }, { category: "self", summary: "SUSE CVE CVE-2022-2817 page", url: "https://www.suse.com/security/cve/CVE-2022-2817/", }, { category: "self", summary: "SUSE CVE CVE-2022-2819 page", url: "https://www.suse.com/security/cve/CVE-2022-2819/", }, { category: "self", summary: "SUSE CVE CVE-2022-2849 page", url: "https://www.suse.com/security/cve/CVE-2022-2849/", }, { category: "self", summary: "SUSE CVE CVE-2022-2862 page", url: "https://www.suse.com/security/cve/CVE-2022-2862/", }, { category: "self", summary: "SUSE CVE CVE-2022-2874 page", url: "https://www.suse.com/security/cve/CVE-2022-2874/", }, { category: "self", summary: "SUSE CVE CVE-2022-2889 page", url: "https://www.suse.com/security/cve/CVE-2022-2889/", }, { category: "self", summary: "SUSE CVE CVE-2022-2923 page", url: "https://www.suse.com/security/cve/CVE-2022-2923/", }, { category: "self", summary: "SUSE CVE CVE-2022-2946 page", url: "https://www.suse.com/security/cve/CVE-2022-2946/", }, { category: "self", summary: "SUSE CVE CVE-2022-2980 page", url: "https://www.suse.com/security/cve/CVE-2022-2980/", }, { category: "self", summary: "SUSE CVE CVE-2022-2982 page", url: "https://www.suse.com/security/cve/CVE-2022-2982/", }, { category: "self", summary: "SUSE CVE CVE-2022-3016 page", url: "https://www.suse.com/security/cve/CVE-2022-3016/", }, { category: "self", summary: "SUSE CVE CVE-2022-3037 page", url: "https://www.suse.com/security/cve/CVE-2022-3037/", }, { category: "self", summary: "SUSE CVE CVE-2022-3153 page", url: "https://www.suse.com/security/cve/CVE-2022-3153/", }, ], title: "gvim-9.0.0453-2.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:12337-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gvim-9.0.0453-2.1.aarch64", product: { name: "gvim-9.0.0453-2.1.aarch64", product_id: "gvim-9.0.0453-2.1.aarch64", }, }, { category: "product_version", name: "vim-9.0.0453-2.1.aarch64", product: { name: "vim-9.0.0453-2.1.aarch64", product_id: "vim-9.0.0453-2.1.aarch64", }, }, { category: "product_version", name: "vim-data-9.0.0453-2.1.aarch64", product: { name: "vim-data-9.0.0453-2.1.aarch64", product_id: "vim-data-9.0.0453-2.1.aarch64", }, }, { category: "product_version", name: "vim-data-common-9.0.0453-2.1.aarch64", product: { name: "vim-data-common-9.0.0453-2.1.aarch64", product_id: "vim-data-common-9.0.0453-2.1.aarch64", }, }, { category: "product_version", name: "vim-small-9.0.0453-2.1.aarch64", product: { name: "vim-small-9.0.0453-2.1.aarch64", product_id: "vim-small-9.0.0453-2.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gvim-9.0.0453-2.1.ppc64le", product: { name: "gvim-9.0.0453-2.1.ppc64le", product_id: "gvim-9.0.0453-2.1.ppc64le", }, }, { category: "product_version", name: "vim-9.0.0453-2.1.ppc64le", product: { name: "vim-9.0.0453-2.1.ppc64le", product_id: "vim-9.0.0453-2.1.ppc64le", }, }, { category: "product_version", name: "vim-data-9.0.0453-2.1.ppc64le", product: { name: "vim-data-9.0.0453-2.1.ppc64le", product_id: "vim-data-9.0.0453-2.1.ppc64le", }, }, { category: "product_version", name: "vim-data-common-9.0.0453-2.1.ppc64le", product: { name: "vim-data-common-9.0.0453-2.1.ppc64le", product_id: "vim-data-common-9.0.0453-2.1.ppc64le", }, }, { category: "product_version", name: "vim-small-9.0.0453-2.1.ppc64le", product: { name: "vim-small-9.0.0453-2.1.ppc64le", product_id: "vim-small-9.0.0453-2.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gvim-9.0.0453-2.1.s390x", product: { name: "gvim-9.0.0453-2.1.s390x", product_id: "gvim-9.0.0453-2.1.s390x", }, }, { category: "product_version", name: "vim-9.0.0453-2.1.s390x", product: { name: "vim-9.0.0453-2.1.s390x", product_id: "vim-9.0.0453-2.1.s390x", }, }, { category: "product_version", name: "vim-data-9.0.0453-2.1.s390x", product: { name: "vim-data-9.0.0453-2.1.s390x", product_id: "vim-data-9.0.0453-2.1.s390x", }, }, { category: "product_version", name: "vim-data-common-9.0.0453-2.1.s390x", product: { name: "vim-data-common-9.0.0453-2.1.s390x", product_id: "vim-data-common-9.0.0453-2.1.s390x", }, }, { category: "product_version", name: "vim-small-9.0.0453-2.1.s390x", product: { name: "vim-small-9.0.0453-2.1.s390x", product_id: "vim-small-9.0.0453-2.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gvim-9.0.0453-2.1.x86_64", product: { name: "gvim-9.0.0453-2.1.x86_64", product_id: "gvim-9.0.0453-2.1.x86_64", }, }, { category: "product_version", name: "vim-9.0.0453-2.1.x86_64", product: { name: "vim-9.0.0453-2.1.x86_64", product_id: "vim-9.0.0453-2.1.x86_64", }, }, { category: "product_version", name: "vim-data-9.0.0453-2.1.x86_64", product: { name: "vim-data-9.0.0453-2.1.x86_64", product_id: "vim-data-9.0.0453-2.1.x86_64", }, }, { category: "product_version", name: "vim-data-common-9.0.0453-2.1.x86_64", product: { name: "vim-data-common-9.0.0453-2.1.x86_64", product_id: "vim-data-common-9.0.0453-2.1.x86_64", }, }, { category: "product_version", name: "vim-small-9.0.0453-2.1.x86_64", product: { name: "vim-small-9.0.0453-2.1.x86_64", product_id: "vim-small-9.0.0453-2.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "gvim-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", }, product_reference: "gvim-9.0.0453-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", }, product_reference: "gvim-9.0.0453-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", }, product_reference: "gvim-9.0.0453-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", }, product_reference: "gvim-9.0.0453-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", }, product_reference: "vim-9.0.0453-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", }, product_reference: "vim-9.0.0453-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", }, product_reference: "vim-9.0.0453-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", }, product_reference: "vim-9.0.0453-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", }, product_reference: "vim-data-9.0.0453-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", }, product_reference: "vim-data-9.0.0453-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", }, product_reference: "vim-data-9.0.0453-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", }, product_reference: "vim-data-9.0.0453-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", }, product_reference: "vim-data-common-9.0.0453-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", }, product_reference: "vim-data-common-9.0.0453-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", }, product_reference: "vim-data-common-9.0.0453-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", }, product_reference: "vim-data-common-9.0.0453-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-small-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", }, product_reference: "vim-small-9.0.0453-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-small-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", }, product_reference: "vim-small-9.0.0453-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-small-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", }, product_reference: "vim-small-9.0.0453-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-small-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", }, product_reference: "vim-small-9.0.0453-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2021-46059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-46059", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-46059", url: "https://www.suse.com/security/cve/CVE-2021-46059", }, { category: "external", summary: "SUSE Bug 1194556 for CVE-2021-46059", url: "https://bugzilla.suse.com/1194556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-46059", }, { cve: "CVE-2022-0213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0213", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0213", url: "https://www.suse.com/security/cve/CVE-2022-0213", }, { category: "external", summary: "SUSE Bug 1194885 for CVE-2022-0213", url: "https://bugzilla.suse.com/1194885", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0213", }, { cve: "CVE-2022-0261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0261", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0261", url: "https://www.suse.com/security/cve/CVE-2022-0261", }, { category: "external", summary: "SUSE Bug 1194872 for CVE-2022-0261", url: "https://bugzilla.suse.com/1194872", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0318", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0318", url: "https://www.suse.com/security/cve/CVE-2022-0318", }, { category: "external", summary: "SUSE Bug 1195004 for CVE-2022-0318", url: "https://bugzilla.suse.com/1195004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0319", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0319", url: "https://www.suse.com/security/cve/CVE-2022-0319", }, { category: "external", summary: "SUSE Bug 1195066 for CVE-2022-0319", url: "https://bugzilla.suse.com/1195066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0351", }, ], notes: [ { category: "general", text: "Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0351", url: "https://www.suse.com/security/cve/CVE-2022-0351", }, { category: "external", summary: "SUSE Bug 1195126 for CVE-2022-0351", url: "https://bugzilla.suse.com/1195126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0359", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0359", url: "https://www.suse.com/security/cve/CVE-2022-0359", }, { category: "external", summary: "SUSE Bug 1195203 for CVE-2022-0359", url: "https://bugzilla.suse.com/1195203", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0361", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0361", url: "https://www.suse.com/security/cve/CVE-2022-0361", }, { category: "external", summary: "SUSE Bug 1195202 for CVE-2022-0361", url: "https://bugzilla.suse.com/1195202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0361", }, { cve: "CVE-2022-0368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0368", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0368", url: "https://www.suse.com/security/cve/CVE-2022-0368", }, { category: "external", summary: "SUSE Bug 1195205 for CVE-2022-0368", url: "https://bugzilla.suse.com/1195205", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0368", }, { cve: "CVE-2022-0392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0392", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0392", url: "https://www.suse.com/security/cve/CVE-2022-0392", }, { category: "external", summary: "SUSE Bug 1195332 for CVE-2022-0392", url: "https://bugzilla.suse.com/1195332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0407", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0407", url: "https://www.suse.com/security/cve/CVE-2022-0407", }, { category: "external", summary: "SUSE Bug 1195354 for CVE-2022-0407", url: "https://bugzilla.suse.com/1195354", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0407", }, { cve: "CVE-2022-0408", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0408", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0408", url: "https://www.suse.com/security/cve/CVE-2022-0408", }, { category: "external", summary: "SUSE Bug 1195459 for CVE-2022-0408", url: "https://bugzilla.suse.com/1195459", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0408", }, { cve: "CVE-2022-0413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0413", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0413", url: "https://www.suse.com/security/cve/CVE-2022-0413", }, { category: "external", summary: "SUSE Bug 1195356 for CVE-2022-0413", url: "https://bugzilla.suse.com/1195356", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0413", }, { cve: "CVE-2022-0554", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0554", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0554", url: "https://www.suse.com/security/cve/CVE-2022-0554", }, { category: "external", summary: "SUSE Bug 1195846 for CVE-2022-0554", url: "https://bugzilla.suse.com/1195846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0554", }, { cve: "CVE-2022-0572", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0572", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0572", url: "https://www.suse.com/security/cve/CVE-2022-0572", }, { category: "external", summary: "SUSE Bug 1196023 for CVE-2022-0572", url: "https://bugzilla.suse.com/1196023", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0572", }, { cve: "CVE-2022-0629", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0629", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0629", url: "https://www.suse.com/security/cve/CVE-2022-0629", }, { category: "external", summary: "SUSE Bug 1196226 for CVE-2022-0629", url: "https://bugzilla.suse.com/1196226", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0629", }, { cve: "CVE-2022-0685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0685", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0685", url: "https://www.suse.com/security/cve/CVE-2022-0685", }, { category: "external", summary: "SUSE Bug 1196227 for CVE-2022-0685", url: "https://bugzilla.suse.com/1196227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0685", }, { cve: "CVE-2022-0729", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0729", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0729", url: "https://www.suse.com/security/cve/CVE-2022-0729", }, { category: "external", summary: "SUSE Bug 1196437 for CVE-2022-0729", url: "https://bugzilla.suse.com/1196437", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-0729", }, { cve: "CVE-2022-0943", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0943", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0943", url: "https://www.suse.com/security/cve/CVE-2022-0943", }, { category: "external", summary: "SUSE Bug 1197225 for CVE-2022-0943", url: "https://bugzilla.suse.com/1197225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0943", }, { cve: "CVE-2022-1154", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1154", }, ], notes: [ { category: "general", text: "Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1154", url: "https://www.suse.com/security/cve/CVE-2022-1154", }, { category: "external", summary: "SUSE Bug 1197813 for CVE-2022-1154", url: "https://bugzilla.suse.com/1197813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1154", }, { cve: "CVE-2022-1160", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1160", }, ], notes: [ { category: "general", text: "heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2.4647.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1160", url: "https://www.suse.com/security/cve/CVE-2022-1160", }, { category: "external", summary: "SUSE Bug 1197814 for CVE-2022-1160", url: "https://bugzilla.suse.com/1197814", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1160", }, { cve: "CVE-2022-1420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1420", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1420", url: "https://www.suse.com/security/cve/CVE-2022-1420", }, { category: "external", summary: "SUSE Bug 1198748 for CVE-2022-1420", url: "https://bugzilla.suse.com/1198748", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1420", }, { cve: "CVE-2022-1616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1616", }, ], notes: [ { category: "general", text: "Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1616", url: "https://www.suse.com/security/cve/CVE-2022-1616", }, { category: "external", summary: "SUSE Bug 1199331 for CVE-2022-1616", url: "https://bugzilla.suse.com/1199331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1619", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1619", url: "https://www.suse.com/security/cve/CVE-2022-1619", }, { category: "external", summary: "SUSE Bug 1199333 for CVE-2022-1619", url: "https://bugzilla.suse.com/1199333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1620", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1620", url: "https://www.suse.com/security/cve/CVE-2022-1620", }, { category: "external", summary: "SUSE Bug 1199334 for CVE-2022-1620", url: "https://bugzilla.suse.com/1199334", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1620", }, { cve: "CVE-2022-1621", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1621", }, ], notes: [ { category: "general", text: "Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1621", url: "https://www.suse.com/security/cve/CVE-2022-1621", }, { category: "external", summary: "SUSE Bug 1199435 for CVE-2022-1621", url: "https://bugzilla.suse.com/1199435", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1621", }, { cve: "CVE-2022-1629", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1629", }, ], notes: [ { category: "general", text: "Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1629", url: "https://www.suse.com/security/cve/CVE-2022-1629", }, { category: "external", summary: "SUSE Bug 1199436 for CVE-2022-1629", url: "https://bugzilla.suse.com/1199436", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1629", }, { cve: "CVE-2022-1674", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1674", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1674", url: "https://www.suse.com/security/cve/CVE-2022-1674", }, { category: "external", summary: "SUSE Bug 1199502 for CVE-2022-1674", url: "https://bugzilla.suse.com/1199502", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1674", }, { cve: "CVE-2022-1720", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1720", }, ], notes: [ { category: "general", text: "Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1720", url: "https://www.suse.com/security/cve/CVE-2022-1720", }, { category: "external", summary: "SUSE Bug 1200732 for CVE-2022-1720", url: "https://bugzilla.suse.com/1200732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1720", }, { cve: "CVE-2022-1733", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1733", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1733", url: "https://www.suse.com/security/cve/CVE-2022-1733", }, { category: "external", summary: "SUSE Bug 1199655 for CVE-2022-1733", url: "https://bugzilla.suse.com/1199655", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1735", }, ], notes: [ { category: "general", text: "Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1735", url: "https://www.suse.com/security/cve/CVE-2022-1735", }, { category: "external", summary: "SUSE Bug 1199651 for CVE-2022-1735", url: "https://bugzilla.suse.com/1199651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1735", }, { cve: "CVE-2022-1769", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1769", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1769", url: "https://www.suse.com/security/cve/CVE-2022-1769", }, { category: "external", summary: "SUSE Bug 1199658 for CVE-2022-1769", url: "https://bugzilla.suse.com/1199658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1769", }, { cve: "CVE-2022-1771", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1771", }, ], notes: [ { category: "general", text: "Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1771", url: "https://www.suse.com/security/cve/CVE-2022-1771", }, { category: "external", summary: "SUSE Bug 1199693 for CVE-2022-1771", url: "https://bugzilla.suse.com/1199693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1785", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1785", url: "https://www.suse.com/security/cve/CVE-2022-1785", }, { category: "external", summary: "SUSE Bug 1199745 for CVE-2022-1785", url: "https://bugzilla.suse.com/1199745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1796", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.4979.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1796", url: "https://www.suse.com/security/cve/CVE-2022-1796", }, { category: "external", summary: "SUSE Bug 1199747 for CVE-2022-1796", url: "https://bugzilla.suse.com/1199747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1851", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1851", url: "https://www.suse.com/security/cve/CVE-2022-1851", }, { category: "external", summary: "SUSE Bug 1199936 for CVE-2022-1851", url: "https://bugzilla.suse.com/1199936", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1851", }, { cve: "CVE-2022-1886", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1886", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1886", url: "https://www.suse.com/security/cve/CVE-2022-1886", }, { category: "external", summary: "SUSE Bug 1199969 for CVE-2022-1886", url: "https://bugzilla.suse.com/1199969", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1886", }, { cve: "CVE-2022-1897", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1897", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1897", url: "https://www.suse.com/security/cve/CVE-2022-1897", }, { category: "external", summary: "SUSE Bug 1200010 for CVE-2022-1897", url: "https://bugzilla.suse.com/1200010", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1898", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1898", url: "https://www.suse.com/security/cve/CVE-2022-1898", }, { category: "external", summary: "SUSE Bug 1200011 for CVE-2022-1898", url: "https://bugzilla.suse.com/1200011", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1927", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1927", url: "https://www.suse.com/security/cve/CVE-2022-1927", }, { category: "external", summary: "SUSE Bug 1200012 for CVE-2022-1927", url: "https://bugzilla.suse.com/1200012", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1927", }, { cve: "CVE-2022-1942", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1942", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1942", url: "https://www.suse.com/security/cve/CVE-2022-1942", }, { category: "external", summary: "SUSE Bug 1200125 for CVE-2022-1942", url: "https://bugzilla.suse.com/1200125", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1942", }, { cve: "CVE-2022-1968", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1968", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1968", url: "https://www.suse.com/security/cve/CVE-2022-1968", }, { category: "external", summary: "SUSE Bug 1200270 for CVE-2022-1968", url: "https://bugzilla.suse.com/1200270", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1968", }, { cve: "CVE-2022-2000", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2000", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2000", url: "https://www.suse.com/security/cve/CVE-2022-2000", }, { category: "external", summary: "SUSE Bug 1200405 for CVE-2022-2000", url: "https://bugzilla.suse.com/1200405", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-2000", }, { cve: "CVE-2022-2042", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2042", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2042", url: "https://www.suse.com/security/cve/CVE-2022-2042", }, { category: "external", summary: "SUSE Bug 1200471 for CVE-2022-2042", url: "https://bugzilla.suse.com/1200471", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-2042", }, { cve: "CVE-2022-2124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2124", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2124", url: "https://www.suse.com/security/cve/CVE-2022-2124", }, { category: "external", summary: "SUSE Bug 1200697 for CVE-2022-2124", url: "https://bugzilla.suse.com/1200697", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2125", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2125", url: "https://www.suse.com/security/cve/CVE-2022-2125", }, { category: "external", summary: "SUSE Bug 1200698 for CVE-2022-2125", url: "https://bugzilla.suse.com/1200698", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-2125", url: "https://bugzilla.suse.com/1205395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2126", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2126", url: "https://www.suse.com/security/cve/CVE-2022-2126", }, { category: "external", summary: "SUSE Bug 1200700 for CVE-2022-2126", url: "https://bugzilla.suse.com/1200700", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2126", }, { cve: "CVE-2022-2129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2129", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2129", url: "https://www.suse.com/security/cve/CVE-2022-2129", }, { category: "external", summary: "SUSE Bug 1200701 for CVE-2022-2129", url: "https://bugzilla.suse.com/1200701", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2129", }, { cve: "CVE-2022-2175", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2175", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2175", url: "https://www.suse.com/security/cve/CVE-2022-2175", }, { category: "external", summary: "SUSE Bug 1200904 for CVE-2022-2175", url: "https://bugzilla.suse.com/1200904", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2175", }, { cve: "CVE-2022-2182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2182", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2182", url: "https://www.suse.com/security/cve/CVE-2022-2182", }, { category: "external", summary: "SUSE Bug 1200903 for CVE-2022-2182", url: "https://bugzilla.suse.com/1200903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2182", }, { cve: "CVE-2022-2183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2183", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2183", url: "https://www.suse.com/security/cve/CVE-2022-2183", }, { category: "external", summary: "SUSE Bug 1200902 for CVE-2022-2183", url: "https://bugzilla.suse.com/1200902", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2183", }, { cve: "CVE-2022-2206", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2206", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2206", url: "https://www.suse.com/security/cve/CVE-2022-2206", }, { category: "external", summary: "SUSE Bug 1201155 for CVE-2022-2206", url: "https://bugzilla.suse.com/1201155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2206", }, { cve: "CVE-2022-2207", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2207", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2207", url: "https://www.suse.com/security/cve/CVE-2022-2207", }, { category: "external", summary: "SUSE Bug 1201153 for CVE-2022-2207", url: "https://bugzilla.suse.com/1201153", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2207", }, { cve: "CVE-2022-2208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2208", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2208", url: "https://www.suse.com/security/cve/CVE-2022-2208", }, { category: "external", summary: "SUSE Bug 1201152 for CVE-2022-2208", url: "https://bugzilla.suse.com/1201152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2208", }, { cve: "CVE-2022-2210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2210", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2210", url: "https://www.suse.com/security/cve/CVE-2022-2210", }, { category: "external", summary: "SUSE Bug 1201151 for CVE-2022-2210", url: "https://bugzilla.suse.com/1201151", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2210", }, { cve: "CVE-2022-2231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2231", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2231", url: "https://www.suse.com/security/cve/CVE-2022-2231", }, { category: "external", summary: "SUSE Bug 1201150 for CVE-2022-2231", url: "https://bugzilla.suse.com/1201150", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2231", }, { cve: "CVE-2022-2264", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2264", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2264", url: "https://www.suse.com/security/cve/CVE-2022-2264", }, { category: "external", summary: "SUSE Bug 1201132 for CVE-2022-2264", url: "https://bugzilla.suse.com/1201132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2264", }, { cve: "CVE-2022-2284", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2284", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2284", url: "https://www.suse.com/security/cve/CVE-2022-2284", }, { category: "external", summary: "SUSE Bug 1201133 for CVE-2022-2284", url: "https://bugzilla.suse.com/1201133", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2284", }, { cve: "CVE-2022-2286", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2286", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2286", url: "https://www.suse.com/security/cve/CVE-2022-2286", }, { category: "external", summary: "SUSE Bug 1201135 for CVE-2022-2286", url: "https://bugzilla.suse.com/1201135", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2286", }, { cve: "CVE-2022-2287", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2287", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2287", url: "https://www.suse.com/security/cve/CVE-2022-2287", }, { category: "external", summary: "SUSE Bug 1201136 for CVE-2022-2287", url: "https://bugzilla.suse.com/1201136", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2287", }, { cve: "CVE-2022-2288", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2288", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2288", url: "https://www.suse.com/security/cve/CVE-2022-2288", }, { category: "external", summary: "SUSE Bug 1201137 for CVE-2022-2288", url: "https://bugzilla.suse.com/1201137", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2288", }, { cve: "CVE-2022-2289", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2289", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2289", url: "https://www.suse.com/security/cve/CVE-2022-2289", }, { category: "external", summary: "SUSE Bug 1201139 for CVE-2022-2289", url: "https://bugzilla.suse.com/1201139", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2289", }, { cve: "CVE-2022-2304", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2304", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2304", url: "https://www.suse.com/security/cve/CVE-2022-2304", }, { category: "external", summary: "SUSE Bug 1201249 for CVE-2022-2304", url: "https://bugzilla.suse.com/1201249", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2304", }, { cve: "CVE-2022-2343", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2343", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2343", url: "https://www.suse.com/security/cve/CVE-2022-2343", }, { category: "external", summary: "SUSE Bug 1201356 for CVE-2022-2343", url: "https://bugzilla.suse.com/1201356", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2343", }, { cve: "CVE-2022-2344", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2344", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2344", url: "https://www.suse.com/security/cve/CVE-2022-2344", }, { category: "external", summary: "SUSE Bug 1201359 for CVE-2022-2344", url: "https://bugzilla.suse.com/1201359", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2344", }, { cve: "CVE-2022-2345", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2345", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0046.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2345", url: "https://www.suse.com/security/cve/CVE-2022-2345", }, { category: "external", summary: "SUSE Bug 1201363 for CVE-2022-2345", url: "https://bugzilla.suse.com/1201363", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2345", }, { cve: "CVE-2022-2571", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2571", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2571", url: "https://www.suse.com/security/cve/CVE-2022-2571", }, { category: "external", summary: "SUSE Bug 1202046 for CVE-2022-2571", url: "https://bugzilla.suse.com/1202046", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2571", }, { cve: "CVE-2022-2580", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2580", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2580", url: "https://www.suse.com/security/cve/CVE-2022-2580", }, { category: "external", summary: "SUSE Bug 1202049 for CVE-2022-2580", url: "https://bugzilla.suse.com/1202049", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2580", }, { cve: "CVE-2022-2581", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2581", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2581", url: "https://www.suse.com/security/cve/CVE-2022-2581", }, { category: "external", summary: "SUSE Bug 1202050 for CVE-2022-2581", url: "https://bugzilla.suse.com/1202050", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2581", }, { cve: "CVE-2022-2598", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2598", }, ], notes: [ { category: "general", text: "Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2598", url: "https://www.suse.com/security/cve/CVE-2022-2598", }, { category: "external", summary: "SUSE Bug 1202051 for CVE-2022-2598", url: "https://bugzilla.suse.com/1202051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2598", }, { cve: "CVE-2022-2816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2816", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2816", url: "https://www.suse.com/security/cve/CVE-2022-2816", }, { category: "external", summary: "SUSE Bug 1202421 for CVE-2022-2816", url: "https://bugzilla.suse.com/1202421", }, { category: "external", summary: "SUSE Bug 1203576 for CVE-2022-2816", url: "https://bugzilla.suse.com/1203576", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2816", }, { cve: "CVE-2022-2817", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2817", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0213.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2817", url: "https://www.suse.com/security/cve/CVE-2022-2817", }, { category: "external", summary: "SUSE Bug 1202420 for CVE-2022-2817", url: "https://bugzilla.suse.com/1202420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2817", }, { cve: "CVE-2022-2819", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2819", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2819", url: "https://www.suse.com/security/cve/CVE-2022-2819", }, { category: "external", summary: "SUSE Bug 1202414 for CVE-2022-2819", url: "https://bugzilla.suse.com/1202414", }, { category: "external", summary: "SUSE Bug 1203576 for CVE-2022-2819", url: "https://bugzilla.suse.com/1203576", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2819", }, { cve: "CVE-2022-2849", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2849", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2849", url: "https://www.suse.com/security/cve/CVE-2022-2849", }, { category: "external", summary: "SUSE Bug 1202512 for CVE-2022-2849", url: "https://bugzilla.suse.com/1202512", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2849", }, { cve: "CVE-2022-2862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2862", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0221.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2862", url: "https://www.suse.com/security/cve/CVE-2022-2862", }, { category: "external", summary: "SUSE Bug 1202511 for CVE-2022-2862", url: "https://bugzilla.suse.com/1202511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2862", }, { cve: "CVE-2022-2874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2874", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2874", url: "https://www.suse.com/security/cve/CVE-2022-2874", }, { category: "external", summary: "SUSE Bug 1202552 for CVE-2022-2874", url: "https://bugzilla.suse.com/1202552", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2874", }, { cve: "CVE-2022-2889", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2889", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0225.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2889", url: "https://www.suse.com/security/cve/CVE-2022-2889", }, { category: "external", summary: "SUSE Bug 1202599 for CVE-2022-2889", url: "https://bugzilla.suse.com/1202599", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2889", }, { cve: "CVE-2022-2923", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2923", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2923", url: "https://www.suse.com/security/cve/CVE-2022-2923", }, { category: "external", summary: "SUSE Bug 1202687 for CVE-2022-2923", url: "https://bugzilla.suse.com/1202687", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2923", }, { cve: "CVE-2022-2946", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2946", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0246.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2946", url: "https://www.suse.com/security/cve/CVE-2022-2946", }, { category: "external", summary: "SUSE Bug 1202689 for CVE-2022-2946", url: "https://bugzilla.suse.com/1202689", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2946", }, { cve: "CVE-2022-2980", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2980", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2980", url: "https://www.suse.com/security/cve/CVE-2022-2980", }, { category: "external", summary: "SUSE Bug 1203155 for CVE-2022-2980", url: "https://bugzilla.suse.com/1203155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2980", }, { cve: "CVE-2022-2982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2982", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0260.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2982", url: "https://www.suse.com/security/cve/CVE-2022-2982", }, { category: "external", summary: "SUSE Bug 1203152 for CVE-2022-2982", url: "https://bugzilla.suse.com/1203152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2982", }, { cve: "CVE-2022-3016", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3016", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0286.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3016", url: "https://www.suse.com/security/cve/CVE-2022-3016", }, { category: "external", summary: "SUSE Bug 1202862 for CVE-2022-3016", url: "https://bugzilla.suse.com/1202862", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-3016", }, { cve: "CVE-2022-3037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3037", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0322.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3037", url: "https://www.suse.com/security/cve/CVE-2022-3037", }, { category: "external", summary: "SUSE Bug 1202962 for CVE-2022-3037", url: "https://bugzilla.suse.com/1202962", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-3037", }, { cve: "CVE-2022-3153", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3153", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3153", url: "https://www.suse.com/security/cve/CVE-2022-3153", }, { category: "external", summary: "SUSE Bug 1203272 for CVE-2022-3153", url: "https://bugzilla.suse.com/1203272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-3153", }, ], }
wid-sec-w-2022-1846
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen.", title: "Angriff", }, { category: "general", text: "- MacOS X", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1846 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1846.json", }, { category: "self", summary: "WID-SEC-2022-1846 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1846", }, { category: "external", summary: "Apple Security Advisory HT213488 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213488", }, { category: "external", summary: "Apple Security Advisory HT213493 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213493", }, { category: "external", summary: "Apple Security Advisory HT213494 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213494", }, ], source_lang: "en-US", title: "Apple macOS: Mehrere Schwachstellen", tracking: { current_release_date: "2024-09-16T22:00:00.000+00:00", generator: { date: "2024-09-17T08:17:03.625+00:00", engine: { name: "BSI-WID", version: "1.3.6", }, }, id: "WID-SEC-W-2022-1846", initial_release_date: "2022-10-24T22:00:00.000+00:00", revision_history: [ { date: "2022-10-24T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-10-27T22:00:00.000+00:00", number: "2", summary: "CVEs ergänzt", }, { date: "2023-06-27T22:00:00.000+00:00", number: "3", summary: "CVE's ergänzt", }, { date: "2023-08-14T22:00:00.000+00:00", number: "4", summary: "CVE Nummern ergänzt", }, { date: "2024-06-10T22:00:00.000+00:00", number: "5", summary: "CVE's ergänzt", }, { date: "2024-09-16T22:00:00.000+00:00", number: "6", summary: "CVE-2022-46723 ergänzt", }, ], status: "final", version: "6", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "Ventura_13", product: { name: "Apple macOS Ventura_13", product_id: "T025102", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:ventura_13", }, }, }, { category: "product_version", name: "Big Sur 11.7.1", product: { name: "Apple macOS Big Sur 11.7.1", product_id: "T025103", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:big_sur_11.7.1", }, }, }, { category: "product_version", name: "Monterey 12.6.1", product: { name: "Apple macOS Monterey 12.6.1", product_id: "T025104", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:monterey_12.6.1", }, }, }, ], category: "product_name", name: "macOS", }, ], category: "vendor", name: "Apple", }, ], }, vulnerabilities: [ { cve: "CVE-2021-36690", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2021-36690", }, { cve: "CVE-2021-39537", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2021-39537", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0361", }, { cve: "CVE-2022-0368", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0368", }, { cve: "CVE-2022-0392", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0392", }, { cve: "CVE-2022-0554", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0554", }, { cve: "CVE-2022-0572", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0572", }, { cve: "CVE-2022-0629", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0629", }, { cve: "CVE-2022-0685", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0685", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0714", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0714", }, { cve: "CVE-2022-0729", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0729", }, { cve: "CVE-2022-0943", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0943", }, { cve: "CVE-2022-1381", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1420", }, { cve: "CVE-2022-1616", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1620", }, { cve: "CVE-2022-1621", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1621", }, { cve: "CVE-2022-1622", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1622", }, { cve: "CVE-2022-1629", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1629", }, { cve: "CVE-2022-1674", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1674", }, { cve: "CVE-2022-1720", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1720", }, { cve: "CVE-2022-1725", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1725", }, { cve: "CVE-2022-1733", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1735", }, { cve: "CVE-2022-1769", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1769", }, { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1927", }, { cve: "CVE-2022-1942", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1942", }, { cve: "CVE-2022-1968", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1968", }, { cve: "CVE-2022-2000", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2000", }, { cve: "CVE-2022-2042", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2042", }, { cve: "CVE-2022-2124", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2126", }, { cve: "CVE-2022-26699", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-26699", }, { cve: "CVE-2022-26730", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-26730", }, { cve: "CVE-2022-28739", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-28739", }, { cve: "CVE-2022-29458", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-29458", }, { cve: "CVE-2022-32205", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32205", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32207", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32207", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32827", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32827", }, { cve: "CVE-2022-32835", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32835", }, { cve: "CVE-2022-32858", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32858", }, { cve: "CVE-2022-32859", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32859", }, { cve: "CVE-2022-32862", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32862", }, { cve: "CVE-2022-32864", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32864", }, { cve: "CVE-2022-32865", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32865", }, { cve: "CVE-2022-32866", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32866", }, { cve: "CVE-2022-32867", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32867", }, { cve: "CVE-2022-32870", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32870", }, { cve: "CVE-2022-32875", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32875", }, { cve: "CVE-2022-32876", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32876", }, { cve: "CVE-2022-32877", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32877", }, { cve: "CVE-2022-32879", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32879", }, { cve: "CVE-2022-32881", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32881", }, { cve: "CVE-2022-32883", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32883", }, { cve: "CVE-2022-32886", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32886", }, { cve: "CVE-2022-32888", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32888", }, { cve: "CVE-2022-32890", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32890", }, { cve: "CVE-2022-32892", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32892", }, { cve: "CVE-2022-32895", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32895", }, { cve: "CVE-2022-32898", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32898", }, { cve: "CVE-2022-32899", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32899", }, { cve: "CVE-2022-32902", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32902", }, { cve: "CVE-2022-32903", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32903", }, { cve: "CVE-2022-32904", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32904", }, { cve: "CVE-2022-32905", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32905", }, { cve: "CVE-2022-32907", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32907", }, { cve: "CVE-2022-32908", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32908", }, { cve: "CVE-2022-32909", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32909", }, { cve: "CVE-2022-32911", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32911", }, { cve: "CVE-2022-32912", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32912", }, { cve: "CVE-2022-32913", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32913", }, { cve: "CVE-2022-32914", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32914", }, { cve: "CVE-2022-32915", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32915", }, { cve: "CVE-2022-32918", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32918", }, { cve: "CVE-2022-32922", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32922", }, { cve: "CVE-2022-32924", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32924", }, { cve: "CVE-2022-32928", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32928", }, { cve: "CVE-2022-32934", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32934", }, { cve: "CVE-2022-32936", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32936", }, { cve: "CVE-2022-32938", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32938", }, { cve: "CVE-2022-32940", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32940", }, { cve: "CVE-2022-32947", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32947", }, { cve: "CVE-2022-42788", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42788", }, { cve: "CVE-2022-42789", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42789", }, { cve: "CVE-2022-42790", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42790", }, { cve: "CVE-2022-42791", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42791", }, { cve: "CVE-2022-42793", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42793", }, { cve: "CVE-2022-42795", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42795", }, { cve: "CVE-2022-42796", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42796", }, { cve: "CVE-2022-42799", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42799", }, { cve: "CVE-2022-42806", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42806", }, { cve: "CVE-2022-42808", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42808", }, { cve: "CVE-2022-42809", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42809", }, { cve: "CVE-2022-42811", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42811", }, { cve: "CVE-2022-42813", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42813", }, { cve: "CVE-2022-42814", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42814", }, { cve: "CVE-2022-42815", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42815", }, { cve: "CVE-2022-42818", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42818", }, { cve: "CVE-2022-42819", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42819", }, { cve: "CVE-2022-42820", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42820", }, { cve: "CVE-2022-42823", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42823", }, { cve: "CVE-2022-42824", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42824", }, { cve: "CVE-2022-42825", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42825", }, { cve: "CVE-2022-42828", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42828", }, { cve: "CVE-2022-42829", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42829", }, { cve: "CVE-2022-42830", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42830", }, { cve: "CVE-2022-42831", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42831", }, { cve: "CVE-2022-42832", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42832", }, { cve: "CVE-2022-42833", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42833", }, { cve: "CVE-2022-42834", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42834", }, { cve: "CVE-2022-42838", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42838", }, { cve: "CVE-2022-42860", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42860", }, { cve: "CVE-2022-46709", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46709", }, { cve: "CVE-2022-46712", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46712", }, { cve: "CVE-2022-46713", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46713", }, { cve: "CVE-2022-46721", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46721", }, { cve: "CVE-2022-46722", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46722", }, { cve: "CVE-2022-46723", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46723", }, { cve: "CVE-2022-47915", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-47915", }, { cve: "CVE-2022-47965", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-47965", }, { cve: "CVE-2022-48504", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48504", }, { cve: "CVE-2022-48505", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48505", }, { cve: "CVE-2022-48577", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48577", }, { cve: "CVE-2022-48683", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48683", }, ], }
WID-SEC-W-2022-0131
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen in vim ausnutzen, um den Arbeitsspeicher zu verändern, Code auszuführen oder einen Denial of Service zu verursachen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0131 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0131.json", }, { category: "self", summary: "WID-SEC-2022-0131 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0131", }, { category: "external", summary: "Ubuntu Security Notice USN-5995-1 vom 2023-04-04", url: "https://ubuntu.com/security/notices/USN-5995-1", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2023-0958 vom 2023-02-28", url: "http://linux.oracle.com/errata/ELSA-2023-0958.html", }, { category: "external", summary: "IBM Security Bulletin 6958506 vom 2023-02-27", url: "https://www.ibm.com/support/pages/node/6958506", }, { category: "external", summary: "Debian Security Advisory DLA-3053 vom 2022-06-20", url: "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2102-1 vom 2022-06-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html", }, { category: "external", summary: "RedHat Bugzilla vom 2022-05-30", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091676", }, { category: "external", summary: "RedHat Bugzilla vom 2022-05-30", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091687", }, { category: "external", summary: "PoC auf huntr.dev", url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777/", }, { category: "external", summary: "PoC auf huntr.dev", url: "https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d", }, { category: "external", summary: "Ubuntu Security Notice USN-5498-1 vom 2022-06-30", url: "https://ubuntu.com/security/notices/USN-5498-1", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1829 vom 2022-07-21", url: "https://alas.aws.amazon.com/AL2/ALAS-2022-1829.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-116 vom 2022-07-21", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-116.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:5813 vom 2022-08-03", url: "https://access.redhat.com/errata/RHSA-2022:5813", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1628 vom 2022-08-05", url: "https://alas.aws.amazon.com/ALAS-2022-1628.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-5813 vom 2022-08-05", url: "http://linux.oracle.com/errata/ELSA-2022-5813.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2022-110 vom 2022-08-04", url: "https://downloads.avaya.com/css/P8/documents/101083118", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:5942 vom 2022-08-09", url: "https://access.redhat.com/errata/RHSA-2022:5942", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-5942 vom 2022-08-10", url: "http://linux.oracle.com/errata/ELSA-2022-5942.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202208-32 vom 2022-08-23", url: "https://security.gentoo.org/glsa/202208-32", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:6184 vom 2022-08-25", url: "https://access.redhat.com/errata/RHSA-2022:6184", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:6183 vom 2022-09-06", url: "https://access.redhat.com/errata/RHSA-2022:6183", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:6182 vom 2022-09-06", url: "https://access.redhat.com/errata/RHSA-2022:6182", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:7058 vom 2022-10-20", url: "https://access.redhat.com/errata/RHSA-2022:7058", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:7055 vom 2022-10-19", url: "https://access.redhat.com/errata/RHSA-2022:7055", }, { category: "external", summary: "Debian Security Advisory DLA-3182 vom 2022-11-08", url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:8781 vom 2022-12-08", url: "https://access.redhat.com/errata/RHSA-2022:8781", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:4619-1 vom 2022-12-27", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html", }, ], source_lang: "en-US", title: "vim: Mehrere Schwachstellen", tracking: { current_release_date: "2023-04-03T22:00:00.000+00:00", generator: { date: "2024-08-15T17:26:45.801+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0131", initial_release_date: "2022-05-30T22:00:00.000+00:00", revision_history: [ { date: "2022-05-30T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-05-31T22:00:00.000+00:00", number: "2", summary: "Referenz(en) aufgenommen: FEDORA-2022-3BEDA3EE25, FEDORA-2022-5CE148636B, FEDORA-2022-D94440BF0E", }, { date: "2022-06-06T22:00:00.000+00:00", number: "3", summary: "Referenz(en) aufgenommen: FEDORA-2022-BB2DAAD935", }, { date: "2022-06-16T22:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-06-20T22:00:00.000+00:00", number: "5", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-06-30T22:00:00.000+00:00", number: "6", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-07-20T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-07-21T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-08-03T22:00:00.000+00:00", number: "9", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-08-04T22:00:00.000+00:00", number: "10", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-08-07T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Oracle Linux und AVAYA aufgenommen", }, { date: "2022-08-09T22:00:00.000+00:00", number: "12", summary: "Neue Updates von Red Hat und Oracle Linux aufgenommen", }, { date: "2022-08-22T22:00:00.000+00:00", number: "13", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2022-08-25T22:00:00.000+00:00", number: "14", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-09-06T22:00:00.000+00:00", number: "15", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-10-19T22:00:00.000+00:00", number: "16", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-11-08T23:00:00.000+00:00", number: "17", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-12-07T23:00:00.000+00:00", number: "18", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-12-26T23:00:00.000+00:00", number: "19", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-02-27T23:00:00.000+00:00", number: "20", summary: "Neue Updates von IBM aufgenommen", }, { date: "2023-02-28T23:00:00.000+00:00", number: "21", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2023-04-03T22:00:00.000+00:00", number: "22", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "22", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Avaya Aura Application Enablement Services", product: { name: "Avaya Aura Application Enablement Services", product_id: "T015516", product_identification_helper: { cpe: "cpe:/a:avaya:aura_application_enablement_services:-", }, }, }, { category: "product_name", name: "Avaya Aura Communication Manager", product: { name: "Avaya Aura Communication Manager", product_id: "T015126", product_identification_helper: { cpe: "cpe:/a:avaya:communication_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { branches: [ { category: "product_name", name: "IBM QRadar SIEM 7.5", product: { name: "IBM QRadar SIEM 7.5", product_id: "T022954", product_identification_helper: { cpe: "cpe:/a:ibm:qradar_siem:7.5", }, }, }, { category: "product_name", name: "IBM QRadar SIEM 7.4", product: { name: "IBM QRadar SIEM 7.4", product_id: "T025626", product_identification_helper: { cpe: "cpe:/a:ibm:qradar_siem:7.4", }, }, }, ], category: "product_name", name: "QRadar SIEM", }, ], category: "vendor", name: "IBM", }, { branches: [ { category: "product_name", name: "Open Source vim < 8.2", product: { name: "Open Source vim < 8.2", product_id: "T021894", product_identification_helper: { cpe: "cpe:/a:vim:vim:8.2", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, { category: "product_name", name: "Red Hat OpenShift", product: { name: "Red Hat OpenShift", product_id: "T008027", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In vim existieren mehrere Schwachstellen. Dabei handelt es sich um ein \"out-of-bounds read\" und ein \"buffer over-read\" Problem. Ein Angreifer kann diese Schwachstellen ausnutzen, um den Arbeitsspeicher zu verändern, Code auszuführen oder einen Denial of Service zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T015519", "T008027", "T015518", "67646", "T015516", "T015127", "T015126", "T012167", "T004914", "T022954", "2951", "T002207", "T000126", "T025626", "398363", ], }, release_date: "2022-05-30T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In vim existieren mehrere Schwachstellen. Dabei handelt es sich um ein \"out-of-bounds read\" und ein \"buffer over-read\" Problem. Ein Angreifer kann diese Schwachstellen ausnutzen, um den Arbeitsspeicher zu verändern, Code auszuführen oder einen Denial of Service zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T015519", "T008027", "T015518", "67646", "T015516", "T015127", "T015126", "T012167", "T004914", "T022954", "2951", "T002207", "T000126", "T025626", "398363", ], }, release_date: "2022-05-30T22:00:00.000+00:00", title: "CVE-2022-1927", }, ], }
wid-sec-w-2022-0131
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen in vim ausnutzen, um den Arbeitsspeicher zu verändern, Code auszuführen oder einen Denial of Service zu verursachen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0131 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0131.json", }, { category: "self", summary: "WID-SEC-2022-0131 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0131", }, { category: "external", summary: "Ubuntu Security Notice USN-5995-1 vom 2023-04-04", url: "https://ubuntu.com/security/notices/USN-5995-1", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2023-0958 vom 2023-02-28", url: "http://linux.oracle.com/errata/ELSA-2023-0958.html", }, { category: "external", summary: "IBM Security Bulletin 6958506 vom 2023-02-27", url: "https://www.ibm.com/support/pages/node/6958506", }, { category: "external", summary: "Debian Security Advisory DLA-3053 vom 2022-06-20", url: "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2102-1 vom 2022-06-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html", }, { category: "external", summary: "RedHat Bugzilla vom 2022-05-30", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091676", }, { category: "external", summary: "RedHat Bugzilla vom 2022-05-30", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2091687", }, { category: "external", summary: "PoC auf huntr.dev", url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777/", }, { category: "external", summary: "PoC auf huntr.dev", url: "https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d", }, { category: "external", summary: "Ubuntu Security Notice USN-5498-1 vom 2022-06-30", url: "https://ubuntu.com/security/notices/USN-5498-1", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1829 vom 2022-07-21", url: "https://alas.aws.amazon.com/AL2/ALAS-2022-1829.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-116 vom 2022-07-21", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-116.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:5813 vom 2022-08-03", url: "https://access.redhat.com/errata/RHSA-2022:5813", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1628 vom 2022-08-05", url: "https://alas.aws.amazon.com/ALAS-2022-1628.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-5813 vom 2022-08-05", url: "http://linux.oracle.com/errata/ELSA-2022-5813.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2022-110 vom 2022-08-04", url: "https://downloads.avaya.com/css/P8/documents/101083118", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:5942 vom 2022-08-09", url: "https://access.redhat.com/errata/RHSA-2022:5942", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-5942 vom 2022-08-10", url: "http://linux.oracle.com/errata/ELSA-2022-5942.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202208-32 vom 2022-08-23", url: "https://security.gentoo.org/glsa/202208-32", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:6184 vom 2022-08-25", url: "https://access.redhat.com/errata/RHSA-2022:6184", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:6183 vom 2022-09-06", url: "https://access.redhat.com/errata/RHSA-2022:6183", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:6182 vom 2022-09-06", url: "https://access.redhat.com/errata/RHSA-2022:6182", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:7058 vom 2022-10-20", url: "https://access.redhat.com/errata/RHSA-2022:7058", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:7055 vom 2022-10-19", url: "https://access.redhat.com/errata/RHSA-2022:7055", }, { category: "external", summary: "Debian Security Advisory DLA-3182 vom 2022-11-08", url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:8781 vom 2022-12-08", url: "https://access.redhat.com/errata/RHSA-2022:8781", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:4619-1 vom 2022-12-27", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html", }, ], source_lang: "en-US", title: "vim: Mehrere Schwachstellen", tracking: { current_release_date: "2023-04-03T22:00:00.000+00:00", generator: { date: "2024-08-15T17:26:45.801+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0131", initial_release_date: "2022-05-30T22:00:00.000+00:00", revision_history: [ { date: "2022-05-30T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-05-31T22:00:00.000+00:00", number: "2", summary: "Referenz(en) aufgenommen: FEDORA-2022-3BEDA3EE25, FEDORA-2022-5CE148636B, FEDORA-2022-D94440BF0E", }, { date: "2022-06-06T22:00:00.000+00:00", number: "3", summary: "Referenz(en) aufgenommen: FEDORA-2022-BB2DAAD935", }, { date: "2022-06-16T22:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-06-20T22:00:00.000+00:00", number: "5", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-06-30T22:00:00.000+00:00", number: "6", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-07-20T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-07-21T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-08-03T22:00:00.000+00:00", number: "9", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-08-04T22:00:00.000+00:00", number: "10", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-08-07T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Oracle Linux und AVAYA aufgenommen", }, { date: "2022-08-09T22:00:00.000+00:00", number: "12", summary: "Neue Updates von Red Hat und Oracle Linux aufgenommen", }, { date: "2022-08-22T22:00:00.000+00:00", number: "13", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2022-08-25T22:00:00.000+00:00", number: "14", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-09-06T22:00:00.000+00:00", number: "15", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-10-19T22:00:00.000+00:00", number: "16", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-11-08T23:00:00.000+00:00", number: "17", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-12-07T23:00:00.000+00:00", number: "18", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-12-26T23:00:00.000+00:00", number: "19", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-02-27T23:00:00.000+00:00", number: "20", summary: "Neue Updates von IBM aufgenommen", }, { date: "2023-02-28T23:00:00.000+00:00", number: "21", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2023-04-03T22:00:00.000+00:00", number: "22", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "22", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Avaya Aura Application Enablement Services", product: { name: "Avaya Aura Application Enablement Services", product_id: "T015516", product_identification_helper: { cpe: "cpe:/a:avaya:aura_application_enablement_services:-", }, }, }, { category: "product_name", name: "Avaya Aura Communication Manager", product: { name: "Avaya Aura Communication Manager", product_id: "T015126", product_identification_helper: { cpe: "cpe:/a:avaya:communication_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { branches: [ { category: "product_name", name: "IBM QRadar SIEM 7.5", product: { name: "IBM QRadar SIEM 7.5", product_id: "T022954", product_identification_helper: { cpe: "cpe:/a:ibm:qradar_siem:7.5", }, }, }, { category: "product_name", name: "IBM QRadar SIEM 7.4", product: { name: "IBM QRadar SIEM 7.4", product_id: "T025626", product_identification_helper: { cpe: "cpe:/a:ibm:qradar_siem:7.4", }, }, }, ], category: "product_name", name: "QRadar SIEM", }, ], category: "vendor", name: "IBM", }, { branches: [ { category: "product_name", name: "Open Source vim < 8.2", product: { name: "Open Source vim < 8.2", product_id: "T021894", product_identification_helper: { cpe: "cpe:/a:vim:vim:8.2", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, { category: "product_name", name: "Red Hat OpenShift", product: { name: "Red Hat OpenShift", product_id: "T008027", product_identification_helper: { cpe: "cpe:/a:redhat:openshift:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In vim existieren mehrere Schwachstellen. Dabei handelt es sich um ein \"out-of-bounds read\" und ein \"buffer over-read\" Problem. Ein Angreifer kann diese Schwachstellen ausnutzen, um den Arbeitsspeicher zu verändern, Code auszuführen oder einen Denial of Service zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T015519", "T008027", "T015518", "67646", "T015516", "T015127", "T015126", "T012167", "T004914", "T022954", "2951", "T002207", "T000126", "T025626", "398363", ], }, release_date: "2022-05-30T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In vim existieren mehrere Schwachstellen. Dabei handelt es sich um ein \"out-of-bounds read\" und ein \"buffer over-read\" Problem. Ein Angreifer kann diese Schwachstellen ausnutzen, um den Arbeitsspeicher zu verändern, Code auszuführen oder einen Denial of Service zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T015519", "T008027", "T015518", "67646", "T015516", "T015127", "T015126", "T012167", "T004914", "T022954", "2951", "T002207", "T000126", "T025626", "398363", ], }, release_date: "2022-05-30T22:00:00.000+00:00", title: "CVE-2022-1927", }, ], }
WID-SEC-W-2022-1846
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen.", title: "Angriff", }, { category: "general", text: "- MacOS X", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1846 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1846.json", }, { category: "self", summary: "WID-SEC-2022-1846 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1846", }, { category: "external", summary: "Apple Security Advisory HT213488 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213488", }, { category: "external", summary: "Apple Security Advisory HT213493 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213493", }, { category: "external", summary: "Apple Security Advisory HT213494 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213494", }, ], source_lang: "en-US", title: "Apple macOS: Mehrere Schwachstellen", tracking: { current_release_date: "2024-09-16T22:00:00.000+00:00", generator: { date: "2024-09-17T08:17:03.625+00:00", engine: { name: "BSI-WID", version: "1.3.6", }, }, id: "WID-SEC-W-2022-1846", initial_release_date: "2022-10-24T22:00:00.000+00:00", revision_history: [ { date: "2022-10-24T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-10-27T22:00:00.000+00:00", number: "2", summary: "CVEs ergänzt", }, { date: "2023-06-27T22:00:00.000+00:00", number: "3", summary: "CVE's ergänzt", }, { date: "2023-08-14T22:00:00.000+00:00", number: "4", summary: "CVE Nummern ergänzt", }, { date: "2024-06-10T22:00:00.000+00:00", number: "5", summary: "CVE's ergänzt", }, { date: "2024-09-16T22:00:00.000+00:00", number: "6", summary: "CVE-2022-46723 ergänzt", }, ], status: "final", version: "6", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "Ventura_13", product: { name: "Apple macOS Ventura_13", product_id: "T025102", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:ventura_13", }, }, }, { category: "product_version", name: "Big Sur 11.7.1", product: { name: "Apple macOS Big Sur 11.7.1", product_id: "T025103", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:big_sur_11.7.1", }, }, }, { category: "product_version", name: "Monterey 12.6.1", product: { name: "Apple macOS Monterey 12.6.1", product_id: "T025104", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:monterey_12.6.1", }, }, }, ], category: "product_name", name: "macOS", }, ], category: "vendor", name: "Apple", }, ], }, vulnerabilities: [ { cve: "CVE-2021-36690", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2021-36690", }, { cve: "CVE-2021-39537", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2021-39537", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0361", }, { cve: "CVE-2022-0368", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0368", }, { cve: "CVE-2022-0392", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0392", }, { cve: "CVE-2022-0554", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0554", }, { cve: "CVE-2022-0572", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0572", }, { cve: "CVE-2022-0629", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0629", }, { cve: "CVE-2022-0685", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0685", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0714", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0714", }, { cve: "CVE-2022-0729", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0729", }, { cve: "CVE-2022-0943", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0943", }, { cve: "CVE-2022-1381", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1420", }, { cve: "CVE-2022-1616", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1620", }, { cve: "CVE-2022-1621", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1621", }, { cve: "CVE-2022-1622", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1622", }, { cve: "CVE-2022-1629", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1629", }, { cve: "CVE-2022-1674", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1674", }, { cve: "CVE-2022-1720", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1720", }, { cve: "CVE-2022-1725", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1725", }, { cve: "CVE-2022-1733", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1735", }, { cve: "CVE-2022-1769", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1769", }, { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1927", }, { cve: "CVE-2022-1942", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1942", }, { cve: "CVE-2022-1968", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1968", }, { cve: "CVE-2022-2000", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2000", }, { cve: "CVE-2022-2042", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2042", }, { cve: "CVE-2022-2124", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2126", }, { cve: "CVE-2022-26699", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-26699", }, { cve: "CVE-2022-26730", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-26730", }, { cve: "CVE-2022-28739", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-28739", }, { cve: "CVE-2022-29458", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-29458", }, { cve: "CVE-2022-32205", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32205", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32207", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32207", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32827", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32827", }, { cve: "CVE-2022-32835", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32835", }, { cve: "CVE-2022-32858", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32858", }, { cve: "CVE-2022-32859", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32859", }, { cve: "CVE-2022-32862", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32862", }, { cve: "CVE-2022-32864", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32864", }, { cve: "CVE-2022-32865", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32865", }, { cve: "CVE-2022-32866", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32866", }, { cve: "CVE-2022-32867", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32867", }, { cve: "CVE-2022-32870", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32870", }, { cve: "CVE-2022-32875", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32875", }, { cve: "CVE-2022-32876", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32876", }, { cve: "CVE-2022-32877", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32877", }, { cve: "CVE-2022-32879", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32879", }, { cve: "CVE-2022-32881", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32881", }, { cve: "CVE-2022-32883", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32883", }, { cve: "CVE-2022-32886", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32886", }, { cve: "CVE-2022-32888", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32888", }, { cve: "CVE-2022-32890", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32890", }, { cve: "CVE-2022-32892", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32892", }, { cve: "CVE-2022-32895", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32895", }, { cve: "CVE-2022-32898", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32898", }, { cve: "CVE-2022-32899", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32899", }, { cve: "CVE-2022-32902", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32902", }, { cve: "CVE-2022-32903", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32903", }, { cve: "CVE-2022-32904", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32904", }, { cve: "CVE-2022-32905", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32905", }, { cve: "CVE-2022-32907", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32907", }, { cve: "CVE-2022-32908", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32908", }, { cve: "CVE-2022-32909", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32909", }, { cve: "CVE-2022-32911", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32911", }, { cve: "CVE-2022-32912", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32912", }, { cve: "CVE-2022-32913", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32913", }, { cve: "CVE-2022-32914", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32914", }, { cve: "CVE-2022-32915", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32915", }, { cve: "CVE-2022-32918", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32918", }, { cve: "CVE-2022-32922", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32922", }, { cve: "CVE-2022-32924", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32924", }, { cve: "CVE-2022-32928", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32928", }, { cve: "CVE-2022-32934", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32934", }, { cve: "CVE-2022-32936", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32936", }, { cve: "CVE-2022-32938", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32938", }, { cve: "CVE-2022-32940", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32940", }, { cve: "CVE-2022-32947", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32947", }, { cve: "CVE-2022-42788", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42788", }, { cve: "CVE-2022-42789", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42789", }, { cve: "CVE-2022-42790", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42790", }, { cve: "CVE-2022-42791", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42791", }, { cve: "CVE-2022-42793", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42793", }, { cve: "CVE-2022-42795", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42795", }, { cve: "CVE-2022-42796", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42796", }, { cve: "CVE-2022-42799", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42799", }, { cve: "CVE-2022-42806", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42806", }, { cve: "CVE-2022-42808", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42808", }, { cve: "CVE-2022-42809", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42809", }, { cve: "CVE-2022-42811", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42811", }, { cve: "CVE-2022-42813", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42813", }, { cve: "CVE-2022-42814", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42814", }, { cve: "CVE-2022-42815", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42815", }, { cve: "CVE-2022-42818", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42818", }, { cve: "CVE-2022-42819", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42819", }, { cve: "CVE-2022-42820", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42820", }, { cve: "CVE-2022-42823", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42823", }, { cve: "CVE-2022-42824", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42824", }, { cve: "CVE-2022-42825", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42825", }, { cve: "CVE-2022-42828", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42828", }, { cve: "CVE-2022-42829", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42829", }, { cve: "CVE-2022-42830", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42830", }, { cve: "CVE-2022-42831", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42831", }, { cve: "CVE-2022-42832", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42832", }, { cve: "CVE-2022-42833", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42833", }, { cve: "CVE-2022-42834", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42834", }, { cve: "CVE-2022-42838", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42838", }, { cve: "CVE-2022-42860", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42860", }, { cve: "CVE-2022-46709", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46709", }, { cve: "CVE-2022-46712", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46712", }, { cve: "CVE-2022-46713", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46713", }, { cve: "CVE-2022-46721", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46721", }, { cve: "CVE-2022-46722", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46722", }, { cve: "CVE-2022-46723", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46723", }, { cve: "CVE-2022-47915", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-47915", }, { cve: "CVE-2022-47965", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-47965", }, { cve: "CVE-2022-48504", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48504", }, { cve: "CVE-2022-48505", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48505", }, { cve: "CVE-2022-48577", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48577", }, { cve: "CVE-2022-48683", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48683", }, ], }
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Dell ECS ist ein Objektspeichersystem.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-0794 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json", }, { category: "self", summary: "WID-SEC-2024-0794 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794", }, { category: "external", summary: "Dell Security Advisory DSA-2024-141 vom 2024-04-04", url: "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=", }, ], source_lang: "en-US", title: "Dell ECS: Mehrere Schwachstellen", tracking: { current_release_date: "2024-11-27T23:00:00.000+00:00", generator: { date: "2024-11-28T11:39:04.623+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-0794", initial_release_date: "2024-04-04T22:00:00.000+00:00", revision_history: [ { date: "2024-04-04T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-11-27T23:00:00.000+00:00", number: "2", summary: "Produktzuordnung überprüft", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<3.8.1.0", product: { name: "Dell ECS <3.8.1.0", product_id: "T033919", }, }, { category: "product_version", name: "3.8.1.0", product: { name: "Dell ECS 3.8.1.0", product_id: "T033919-fixed", product_identification_helper: { cpe: "cpe:/h:dell:ecs:3.8.1.0", }, }, }, ], category: "product_name", name: "ECS", }, ], category: "vendor", name: "Dell", }, ], }, vulnerabilities: [ { cve: "CVE-2018-18074", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2018-18074", }, { cve: "CVE-2020-10663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10663", }, { cve: "CVE-2020-10672", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10672", }, { cve: "CVE-2020-10673", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10673", }, { cve: "CVE-2020-10735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10735", }, { cve: "CVE-2020-10968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10968", }, { cve: "CVE-2020-10969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10969", }, { cve: "CVE-2020-11111", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11111", }, { cve: "CVE-2020-11112", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11112", }, { cve: "CVE-2020-11113", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11113", }, { cve: "CVE-2020-11612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11612", }, { cve: "CVE-2020-11619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11619", }, { cve: "CVE-2020-11620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11620", }, { cve: "CVE-2020-11979", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11979", }, { cve: "CVE-2020-12762", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12762", }, { cve: "CVE-2020-12825", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12825", }, { cve: "CVE-2020-13956", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-13956", }, { cve: "CVE-2020-14060", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14060", }, { cve: "CVE-2020-14061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14061", }, { cve: "CVE-2020-14062", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14062", }, { cve: "CVE-2020-14195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14195", }, { cve: "CVE-2020-15250", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-15250", }, { cve: "CVE-2020-1945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1945", }, { cve: "CVE-2020-1967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1967", }, { cve: "CVE-2020-1971", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1971", }, { cve: "CVE-2020-24616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24616", }, { cve: "CVE-2020-24750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24750", }, { cve: "CVE-2020-25649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25649", }, { cve: "CVE-2020-25658", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25658", }, { cve: "CVE-2020-26116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26116", }, { cve: "CVE-2020-26137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26137", }, { cve: "CVE-2020-26541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26541", }, { cve: "CVE-2020-27216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27216", }, { cve: "CVE-2020-27218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27218", }, { cve: "CVE-2020-27223", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27223", }, { cve: "CVE-2020-28366", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28366", }, { cve: "CVE-2020-28493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28493", }, { cve: "CVE-2020-29509", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29509", }, { cve: "CVE-2020-29511", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29511", }, { cve: "CVE-2020-29582", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29582", }, { cve: "CVE-2020-29651", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29651", }, { cve: "CVE-2020-35490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35490", }, { cve: "CVE-2020-35491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35491", }, { cve: "CVE-2020-35728", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35728", }, { cve: "CVE-2020-36179", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36179", }, { cve: "CVE-2020-36180", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36180", }, { cve: "CVE-2020-36181", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36181", }, { cve: "CVE-2020-36182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36182", }, { cve: "CVE-2020-36183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36183", }, { cve: "CVE-2020-36184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36184", }, { cve: "CVE-2020-36185", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36185", }, { cve: "CVE-2020-36186", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36186", }, { cve: "CVE-2020-36187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36187", }, { cve: "CVE-2020-36188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36188", }, { cve: "CVE-2020-36189", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36189", }, { cve: "CVE-2020-36516", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36516", }, { cve: "CVE-2020-36518", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36518", }, { cve: "CVE-2020-36557", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36557", }, { cve: "CVE-2020-36558", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36558", }, { cve: "CVE-2020-36691", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36691", }, { cve: "CVE-2020-7238", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-7238", }, { cve: "CVE-2020-8840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8840", }, { cve: "CVE-2020-8908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8908", }, { cve: "CVE-2020-8911", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8911", }, { cve: "CVE-2020-8912", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8912", }, { cve: "CVE-2020-9488", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9488", }, { cve: "CVE-2020-9493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9493", }, { cve: "CVE-2020-9546", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9546", }, { cve: "CVE-2020-9547", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9547", }, { cve: "CVE-2020-9548", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9548", }, { cve: "CVE-2021-20190", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20190", }, { cve: "CVE-2021-20323", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20323", }, { cve: "CVE-2021-21290", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21290", }, { cve: "CVE-2021-21295", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21295", }, { cve: "CVE-2021-21409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21409", }, { cve: "CVE-2021-23840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23840", }, { cve: "CVE-2021-23841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23841", }, { cve: "CVE-2021-2471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-2471", }, { cve: "CVE-2021-25642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-25642", }, { cve: "CVE-2021-26341", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-26341", }, { cve: "CVE-2021-27918", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-27918", }, { cve: "CVE-2021-28153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28153", }, { cve: "CVE-2021-28165", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28165", }, { cve: "CVE-2021-28169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28169", }, { cve: "CVE-2021-28861", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28861", }, { cve: "CVE-2021-29425", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-29425", }, { cve: "CVE-2021-30560", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-30560", }, { cve: "CVE-2021-3114", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3114", }, { cve: "CVE-2021-33036", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33036", }, { cve: "CVE-2021-33194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33194", }, { cve: "CVE-2021-33195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33195", }, { cve: "CVE-2021-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33196", }, { cve: "CVE-2021-33197", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33197", }, { cve: "CVE-2021-33503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33503", }, { cve: "CVE-2021-33655", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33655", }, { cve: "CVE-2021-33656", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33656", }, { cve: "CVE-2021-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3424", }, { cve: "CVE-2021-34428", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-34428", }, { cve: "CVE-2021-3449", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3449", }, { cve: "CVE-2021-3450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3450", }, { cve: "CVE-2021-3530", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3530", }, { cve: "CVE-2021-36221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36221", }, { cve: "CVE-2021-36373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36373", }, { cve: "CVE-2021-36374", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36374", }, { cve: "CVE-2021-3648", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3648", }, { cve: "CVE-2021-36690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36690", }, { cve: "CVE-2021-3711", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3711", }, { cve: "CVE-2021-3712", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3712", }, { cve: "CVE-2021-37136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37136", }, { cve: "CVE-2021-37137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37137", }, { cve: "CVE-2021-37404", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37404", }, { cve: "CVE-2021-37533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37533", }, { cve: "CVE-2021-3754", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3754", }, { cve: "CVE-2021-3778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3796", }, { cve: "CVE-2021-3826", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3826", }, { cve: "CVE-2021-3827", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3827", }, { cve: "CVE-2021-38297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-38297", }, { cve: "CVE-2021-3872", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3903", }, { cve: "CVE-2021-3923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3923", }, { cve: "CVE-2021-3927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4019", }, { cve: "CVE-2021-4037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4037", }, { cve: "CVE-2021-4069", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4069", }, { cve: "CVE-2021-4104", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4104", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-4157", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4157", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-41771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-41771", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4203", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4203", }, { cve: "CVE-2021-42567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-42567", }, { cve: "CVE-2021-43797", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-43797", }, { cve: "CVE-2021-44531", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44531", }, { cve: "CVE-2021-44532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44532", }, { cve: "CVE-2021-44533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44533", }, { cve: "CVE-2021-44716", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44716", }, { cve: "CVE-2021-44878", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44878", }, { cve: "CVE-2021-45078", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-45078", }, { cve: "CVE-2021-46195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46195", }, { cve: "CVE-2021-46828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46828", }, { cve: "CVE-2021-46848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46848", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2022-0213", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0213", }, { cve: "CVE-2022-0225", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0225", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0361", }, { cve: "CVE-2022-0392", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0407", }, { cve: "CVE-2022-0413", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0413", }, { cve: "CVE-2022-0561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0561", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-1184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1184", }, { cve: "CVE-2022-1245", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1245", }, { cve: "CVE-2022-1271", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1271", }, { cve: "CVE-2022-1292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1292", }, { cve: "CVE-2022-1381", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1420", }, { cve: "CVE-2022-1462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1462", }, { cve: "CVE-2022-1466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1466", }, { cve: "CVE-2022-1471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1471", }, { cve: "CVE-2022-1586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1586", }, { cve: "CVE-2022-1587", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1587", }, { cve: "CVE-2022-1616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1620", }, { cve: "CVE-2022-1679", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1679", }, { cve: "CVE-2022-1705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1705", }, { cve: "CVE-2022-1720", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1720", }, { cve: "CVE-2022-1729", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1729", }, { cve: "CVE-2022-1733", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1735", }, { cve: "CVE-2022-1771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1927", }, { cve: "CVE-2022-1962", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1962", }, { cve: "CVE-2022-1968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1968", }, { cve: "CVE-2022-1974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1974", }, { cve: "CVE-2022-1975", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1975", }, { cve: "CVE-2022-20132", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20132", }, { cve: "CVE-2022-20141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20141", }, { cve: "CVE-2022-20154", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20154", }, { cve: "CVE-2022-20166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20166", }, { cve: "CVE-2022-20368", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20368", }, { cve: "CVE-2022-20369", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20369", }, { cve: "CVE-2022-2047", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2047", }, { cve: "CVE-2022-2048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2048", }, { cve: "CVE-2022-20567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20567", }, { cve: "CVE-2022-2068", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2068", }, { cve: "CVE-2022-2097", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2097", }, { cve: "CVE-2022-21216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21216", }, { cve: "CVE-2022-21233", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21233", }, { cve: "CVE-2022-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2126", }, { cve: "CVE-2022-2129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2129", }, { cve: "CVE-2022-21363", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21363", }, { cve: "CVE-2022-21385", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21385", }, { cve: "CVE-2022-21499", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21499", }, { cve: "CVE-2022-2153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2153", }, { cve: "CVE-2022-21540", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21540", }, { cve: "CVE-2022-21541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21541", }, { cve: "CVE-2022-21549", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21549", }, { cve: "CVE-2022-21618", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21618", }, { cve: "CVE-2022-21619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21619", }, { cve: "CVE-2022-21624", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21624", }, { cve: "CVE-2022-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21626", }, { cve: "CVE-2022-21628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21628", }, { cve: "CVE-2022-21702", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21702", }, { cve: "CVE-2022-2175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2175", }, { cve: "CVE-2022-2182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2182", }, { cve: "CVE-2022-2183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2183", }, { cve: "CVE-2022-2206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2206", }, { cve: "CVE-2022-2207", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2207", }, { cve: "CVE-2022-2208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2208", }, { cve: "CVE-2022-2210", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2210", }, { cve: "CVE-2022-2231", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2231", }, { cve: "CVE-2022-2256", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2256", }, { cve: "CVE-2022-2257", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2257", }, { cve: "CVE-2022-2264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2264", }, { cve: "CVE-2022-2284", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2284", }, { cve: "CVE-2022-2285", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2285", }, { cve: "CVE-2022-2286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2286", }, { cve: "CVE-2022-2287", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2287", }, { cve: "CVE-2022-22976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22976", }, { cve: "CVE-2022-22978", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22978", }, { cve: "CVE-2022-2304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2304", }, { cve: "CVE-2022-2318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2318", }, { cve: "CVE-2022-23302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23302", }, { cve: "CVE-2022-23305", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23305", }, { cve: "CVE-2022-23307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23307", }, { cve: "CVE-2022-2343", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2343", }, { cve: "CVE-2022-2344", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2344", }, { cve: "CVE-2022-2345", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2345", }, { cve: "CVE-2022-23471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23471", }, { cve: "CVE-2022-23521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23521", }, { cve: "CVE-2022-23772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23772", }, { cve: "CVE-2022-23773", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23773", }, { cve: "CVE-2022-24302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24302", }, { cve: "CVE-2022-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24329", }, { cve: "CVE-2022-24823", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24823", }, { cve: "CVE-2022-24903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24903", }, { cve: "CVE-2022-2503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2503", }, { cve: "CVE-2022-25147", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25147", }, { cve: "CVE-2022-25168", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25168", }, { cve: "CVE-2022-2519", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2519", }, { cve: "CVE-2022-2520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2520", }, { cve: "CVE-2022-2521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2521", }, { cve: "CVE-2022-2522", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2522", }, { cve: "CVE-2022-25647", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25647", }, { cve: "CVE-2022-2571", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2571", }, { cve: "CVE-2022-2580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2580", }, { cve: "CVE-2022-2581", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2581", }, { cve: "CVE-2022-25857", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25857", }, { cve: "CVE-2022-2588", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2588", }, { cve: "CVE-2022-2598", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2598", }, { cve: "CVE-2022-26148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26148", }, { cve: "CVE-2022-26365", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26365", }, { cve: "CVE-2022-26373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26373", }, { cve: "CVE-2022-2639", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2639", }, { cve: "CVE-2022-26612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26612", }, { cve: "CVE-2022-2663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2663", }, { cve: "CVE-2022-27781", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27781", }, { cve: "CVE-2022-27782", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27782", }, { cve: "CVE-2022-27943", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27943", }, { cve: "CVE-2022-2795", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2795", }, { cve: "CVE-2022-28131", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28131", }, { cve: "CVE-2022-2816", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2816", }, { cve: "CVE-2022-2817", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2817", }, { cve: "CVE-2022-2819", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2819", }, { cve: "CVE-2022-28327", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28327", }, { cve: "CVE-2022-2845", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2845", }, { cve: "CVE-2022-2849", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2849", }, { cve: "CVE-2022-2862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2862", }, { cve: "CVE-2022-2867", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2867", }, { cve: "CVE-2022-2868", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2868", }, { cve: "CVE-2022-2869", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2869", }, { cve: "CVE-2022-28693", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28693", }, { cve: "CVE-2022-2874", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2874", }, { cve: "CVE-2022-28748", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28748", }, { cve: "CVE-2022-2880", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2880", }, { cve: "CVE-2022-2889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2889", }, { cve: "CVE-2022-29162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29162", }, { cve: "CVE-2022-29187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29187", }, { cve: "CVE-2022-2923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2923", }, { cve: "CVE-2022-2946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2946", }, { cve: "CVE-2022-29526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29526", }, { cve: "CVE-2022-29583", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29583", }, { cve: "CVE-2022-2964", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2964", }, { cve: "CVE-2022-2977", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2977", }, { cve: "CVE-2022-2980", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2980", }, { cve: "CVE-2022-2982", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2982", }, { cve: "CVE-2022-29900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29900", }, { cve: "CVE-2022-29901", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29901", }, { cve: "CVE-2022-2991", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2991", }, { cve: "CVE-2022-3016", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3016", }, { cve: "CVE-2022-3028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3028", }, { cve: "CVE-2022-3037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3037", }, { cve: "CVE-2022-30580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30580", }, { cve: "CVE-2022-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30630", }, { cve: "CVE-2022-30631", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30631", }, { cve: "CVE-2022-30632", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30632", }, { cve: "CVE-2022-30633", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30633", }, { cve: "CVE-2022-3099", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3099", }, { cve: "CVE-2022-31030", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31030", }, { cve: "CVE-2022-31159", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31159", }, { cve: "CVE-2022-3134", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3134", }, { cve: "CVE-2022-3153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3153", }, { cve: "CVE-2022-3169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3169", }, { cve: "CVE-2022-31690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31690", }, { cve: "CVE-2022-32148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32148", }, { cve: "CVE-2022-32149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32149", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32221", }, { cve: "CVE-2022-3234", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3234", }, { cve: "CVE-2022-3235", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3235", }, { cve: "CVE-2022-3239", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3239", }, { cve: "CVE-2022-3278", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3278", }, { cve: "CVE-2022-3296", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3296", }, { cve: "CVE-2022-3297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3297", }, { cve: "CVE-2022-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33196", }, { cve: "CVE-2022-3324", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3324", }, { cve: "CVE-2022-3352", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3352", }, { cve: "CVE-2022-33740", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33740", }, { cve: "CVE-2022-33741", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33741", }, { cve: "CVE-2022-33742", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33742", }, { cve: "CVE-2022-33972", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33972", }, { cve: "CVE-2022-33981", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33981", }, { cve: "CVE-2022-34169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34169", }, { cve: "CVE-2022-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3424", }, { cve: "CVE-2022-34266", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34266", }, { cve: "CVE-2022-34526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34526", }, { cve: "CVE-2022-34903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34903", }, { cve: "CVE-2022-3491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3491", }, { cve: "CVE-2022-3515", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3515", }, { cve: "CVE-2022-3520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3520", }, { cve: "CVE-2022-3521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3521", }, { cve: "CVE-2022-3524", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3524", }, { cve: "CVE-2022-35252", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35252", }, { cve: "CVE-2022-3542", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3542", }, { cve: "CVE-2022-3545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3545", }, { cve: "CVE-2022-3564", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3564", }, { cve: "CVE-2022-3565", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3565", }, { cve: "CVE-2022-3566", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3566", }, { cve: "CVE-2022-3567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3567", }, { cve: "CVE-2022-35737", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35737", }, { cve: "CVE-2022-3586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3586", }, { cve: "CVE-2022-3591", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3591", }, { cve: "CVE-2022-3594", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3594", }, { cve: "CVE-2022-3597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3597", }, { cve: "CVE-2022-3599", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3599", }, { cve: "CVE-2022-36109", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36109", }, { cve: "CVE-2022-3621", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3621", }, { cve: "CVE-2022-3626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3626", }, { cve: "CVE-2022-3627", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3627", }, { cve: "CVE-2022-3628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3628", }, { cve: "CVE-2022-36280", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36280", }, { cve: "CVE-2022-3629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3629", }, { cve: "CVE-2022-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3635", }, { cve: "CVE-2022-3643", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3643", }, { cve: "CVE-2022-36437", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36437", }, { cve: "CVE-2022-3646", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3646", }, { cve: "CVE-2022-3649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3649", }, { cve: "CVE-2022-36760", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36760", }, { cve: "CVE-2022-36879", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36879", }, { cve: "CVE-2022-36946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36946", }, { cve: "CVE-2022-3705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3705", }, { cve: "CVE-2022-37434", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37434", }, { cve: "CVE-2022-37436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37436", }, { cve: "CVE-2022-37865", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37865", }, { cve: "CVE-2022-37866", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37866", }, { cve: "CVE-2022-38090", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38090", }, { cve: "CVE-2022-38096", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38096", }, { cve: "CVE-2022-38126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38126", }, { cve: "CVE-2022-38127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38127", }, { cve: "CVE-2022-38177", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38177", }, { cve: "CVE-2022-38178", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38178", }, { cve: "CVE-2022-3821", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3821", }, { cve: "CVE-2022-38533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38533", }, { cve: "CVE-2022-38749", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38749", }, { cve: "CVE-2022-38750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38750", }, { cve: "CVE-2022-38751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38751", }, { cve: "CVE-2022-38752", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38752", }, { cve: "CVE-2022-39028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39028", }, { cve: "CVE-2022-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3903", }, { cve: "CVE-2022-39188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39188", }, { cve: "CVE-2022-39399", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39399", }, { cve: "CVE-2022-3970", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3970", }, { cve: "CVE-2022-40149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40149", }, { cve: "CVE-2022-40150", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40150", }, { cve: "CVE-2022-40151", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40151", }, { cve: "CVE-2022-40152", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40152", }, { cve: "CVE-2022-40153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40153", }, { cve: "CVE-2022-40303", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40303", }, { cve: "CVE-2022-40304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40304", }, { cve: "CVE-2022-40307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40307", }, { cve: "CVE-2022-40674", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40674", }, { cve: "CVE-2022-40768", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40768", }, { cve: "CVE-2022-40899", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40899", }, { cve: "CVE-2022-4095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4095", }, { cve: "CVE-2022-41218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41218", }, { cve: "CVE-2022-4129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4129", }, { cve: "CVE-2022-4141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4141", }, { cve: "CVE-2022-41717", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41717", }, { cve: "CVE-2022-41721", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41721", }, { cve: "CVE-2022-41848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41848", }, { cve: "CVE-2022-41850", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41850", }, { cve: "CVE-2022-41854", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41854", }, { cve: "CVE-2022-41858", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41858", }, { cve: "CVE-2022-41881", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41881", }, { cve: "CVE-2022-41903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41903", }, { cve: "CVE-2022-41915", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41915", }, { cve: "CVE-2022-41966", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41966", }, { cve: "CVE-2022-41974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41974", }, { cve: "CVE-2022-42003", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42003", }, { cve: "CVE-2022-42004", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42004", }, { cve: "CVE-2022-42010", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42010", }, { cve: "CVE-2022-42011", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42011", }, { cve: "CVE-2022-42012", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42012", }, { cve: "CVE-2022-42328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42328", }, { cve: "CVE-2022-42329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42329", }, { cve: "CVE-2022-42703", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42703", }, { cve: "CVE-2022-42889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42889", }, { cve: "CVE-2022-42895", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42895", }, { cve: "CVE-2022-42896", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42896", }, { cve: "CVE-2022-42898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42898", }, { cve: "CVE-2022-4292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4292", }, { cve: "CVE-2022-4293", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4293", }, { cve: "CVE-2022-42969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42969", }, { cve: "CVE-2022-4304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4304", }, { cve: "CVE-2022-43552", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43552", }, { cve: "CVE-2022-43680", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43680", }, { cve: "CVE-2022-43750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43750", }, { cve: "CVE-2022-4378", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4378", }, { cve: "CVE-2022-43945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43945", }, { cve: "CVE-2022-43995", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43995", }, { cve: "CVE-2022-4415", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4415", }, { cve: "CVE-2022-4450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4450", }, { cve: "CVE-2022-44638", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-44638", }, { cve: "CVE-2022-45061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45061", }, { cve: "CVE-2022-45688", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45688", }, { cve: "CVE-2022-45884", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45884", }, { cve: "CVE-2022-45885", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45885", }, { cve: "CVE-2022-45886", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45886", }, { cve: "CVE-2022-45887", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45887", }, { cve: "CVE-2022-45919", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45919", }, { cve: "CVE-2022-45934", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45934", }, { cve: "CVE-2022-45939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45939", }, { cve: "CVE-2022-4662", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4662", }, { cve: "CVE-2022-46751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46751", }, { cve: "CVE-2022-46908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46908", }, { cve: "CVE-2022-47629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47629", }, { cve: "CVE-2022-47929", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47929", }, { cve: "CVE-2022-48281", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48281", }, { cve: "CVE-2022-48337", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48337", }, { cve: "CVE-2022-48339", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48339", }, { cve: "CVE-2023-0045", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0045", }, { cve: "CVE-2023-0049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0049", }, { cve: "CVE-2023-0051", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0051", }, { cve: "CVE-2023-0054", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0054", }, { cve: "CVE-2023-0215", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0215", }, { cve: "CVE-2023-0286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0286", }, { cve: "CVE-2023-0288", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0288", }, { cve: "CVE-2023-0433", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0433", }, { cve: "CVE-2023-0464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0464", }, { cve: "CVE-2023-0465", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0465", }, { cve: "CVE-2023-0466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0466", }, { cve: "CVE-2023-0512", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0512", }, { cve: "CVE-2023-0590", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0590", }, { cve: "CVE-2023-0597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0597", }, { cve: "CVE-2023-0833", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0833", }, { cve: "CVE-2023-1076", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1076", }, { cve: "CVE-2023-1095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1095", }, { cve: "CVE-2023-1118", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1118", }, { cve: "CVE-2023-1127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1127", }, { cve: "CVE-2023-1170", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1170", }, { cve: "CVE-2023-1175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1175", }, { cve: "CVE-2023-1370", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1370", }, { cve: "CVE-2023-1380", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1380", }, { cve: "CVE-2023-1390", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1390", }, { cve: "CVE-2023-1436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1436", }, { cve: "CVE-2023-1513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1513", }, { cve: "CVE-2023-1611", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1611", }, { cve: "CVE-2023-1670", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1670", }, { cve: "CVE-2023-1855", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1855", }, { cve: "CVE-2023-1989", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1989", }, { cve: "CVE-2023-1990", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1990", }, { cve: "CVE-2023-1998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1998", }, { cve: "CVE-2023-20862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-20862", }, { cve: "CVE-2023-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2124", }, { cve: "CVE-2023-2162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2162", }, { cve: "CVE-2023-2176", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2176", }, { cve: "CVE-2023-21830", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21830", }, { cve: "CVE-2023-21835", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21835", }, { cve: "CVE-2023-21843", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21843", }, { cve: "CVE-2023-21930", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21930", }, { cve: "CVE-2023-21937", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21937", }, { cve: "CVE-2023-21938", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21938", }, { cve: "CVE-2023-21939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21939", }, { cve: "CVE-2023-2194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2194", }, { cve: "CVE-2023-21954", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21954", }, { cve: "CVE-2023-21967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21967", }, { cve: "CVE-2023-21968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21968", }, { cve: "CVE-2023-22490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22490", }, { cve: "CVE-2023-2253", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2253", }, { cve: "CVE-2023-22809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22809", }, { cve: "CVE-2023-23454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23454", }, { cve: "CVE-2023-23455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23455", }, { cve: "CVE-2023-23559", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23559", }, { cve: "CVE-2023-23916", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23916", }, { cve: "CVE-2023-23946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23946", }, { cve: "CVE-2023-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24329", }, { cve: "CVE-2023-24532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24532", }, { cve: "CVE-2023-24534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24534", }, { cve: "CVE-2023-2483", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2483", }, { cve: "CVE-2023-24998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24998", }, { cve: "CVE-2023-2513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2513", }, { cve: "CVE-2023-25193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25193", }, { cve: "CVE-2023-25652", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25652", }, { cve: "CVE-2023-25690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25690", }, { cve: "CVE-2023-25809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25809", }, { cve: "CVE-2023-25815", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25815", }, { cve: "CVE-2023-26048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26048", }, { cve: "CVE-2023-26049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26049", }, { cve: "CVE-2023-2650", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2650", }, { cve: "CVE-2023-26545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26545", }, { cve: "CVE-2023-26604", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26604", }, { cve: "CVE-2023-27533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27533", }, { cve: "CVE-2023-27534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27534", }, { cve: "CVE-2023-27535", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27535", }, { cve: "CVE-2023-27536", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27536", }, { cve: "CVE-2023-27538", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27538", }, { cve: "CVE-2023-27561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27561", }, { cve: "CVE-2023-2828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2828", }, { cve: "CVE-2023-28320", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28320", }, { cve: "CVE-2023-28321", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28321", }, { cve: "CVE-2023-28322", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28322", }, { cve: "CVE-2023-28328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28328", }, { cve: "CVE-2023-28464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28464", }, { cve: "CVE-2023-28486", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28486", }, { cve: "CVE-2023-28487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28487", }, { cve: "CVE-2023-28642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28642", }, { cve: "CVE-2023-28772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28772", }, { cve: "CVE-2023-28840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28840", }, { cve: "CVE-2023-28841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28841", }, { cve: "CVE-2023-28842", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28842", }, { cve: "CVE-2023-29007", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29007", }, { cve: "CVE-2023-29383", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29383", }, { cve: "CVE-2023-29402", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29402", }, { cve: "CVE-2023-29406", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29406", }, { cve: "CVE-2023-29409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29409", }, { cve: "CVE-2023-2976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2976", }, { cve: "CVE-2023-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30630", }, { cve: "CVE-2023-30772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30772", }, { cve: "CVE-2023-31084", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31084", }, { cve: "CVE-2023-3138", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3138", }, { cve: "CVE-2023-31436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31436", }, { cve: "CVE-2023-31484", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31484", }, { cve: "CVE-2023-32269", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32269", }, { cve: "CVE-2023-32697", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32697", }, { cve: "CVE-2023-33264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-33264", }, { cve: "CVE-2023-34034", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34034", }, { cve: "CVE-2023-34035", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34035", }, { cve: "CVE-2023-34453", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34453", }, { cve: "CVE-2023-34454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34454", }, { cve: "CVE-2023-34455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34455", }, { cve: "CVE-2023-34462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34462", }, { cve: "CVE-2023-35116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-35116", }, { cve: "CVE-2023-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3635", }, { cve: "CVE-2023-36479", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-36479", }, { cve: "CVE-2023-39533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-39533", }, { cve: "CVE-2023-40167", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40167", }, { cve: "CVE-2023-40217", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40217", }, { cve: "CVE-2023-41105", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41105", }, { cve: "CVE-2023-41900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41900", }, { cve: "CVE-2023-43642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43642", }, { cve: "CVE-2023-43804", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43804", }, { cve: "CVE-2023-44487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-44487", }, { cve: "CVE-2023-45803", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-45803", }, { cve: "CVE-2024-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2024-21626", }, ], }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Dell ECS ist ein Objektspeichersystem.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-0794 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json", }, { category: "self", summary: "WID-SEC-2024-0794 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794", }, { category: "external", summary: "Dell Security Advisory DSA-2024-141 vom 2024-04-04", url: "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=", }, ], source_lang: "en-US", title: "Dell ECS: Mehrere Schwachstellen", tracking: { current_release_date: "2024-11-27T23:00:00.000+00:00", generator: { date: "2024-11-28T11:39:04.623+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-0794", initial_release_date: "2024-04-04T22:00:00.000+00:00", revision_history: [ { date: "2024-04-04T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-11-27T23:00:00.000+00:00", number: "2", summary: "Produktzuordnung überprüft", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<3.8.1.0", product: { name: "Dell ECS <3.8.1.0", product_id: "T033919", }, }, { category: "product_version", name: "3.8.1.0", product: { name: "Dell ECS 3.8.1.0", product_id: "T033919-fixed", product_identification_helper: { cpe: "cpe:/h:dell:ecs:3.8.1.0", }, }, }, ], category: "product_name", name: "ECS", }, ], category: "vendor", name: "Dell", }, ], }, vulnerabilities: [ { cve: "CVE-2018-18074", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2018-18074", }, { cve: "CVE-2020-10663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10663", }, { cve: "CVE-2020-10672", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10672", }, { cve: "CVE-2020-10673", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10673", }, { cve: "CVE-2020-10735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10735", }, { cve: "CVE-2020-10968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10968", }, { cve: "CVE-2020-10969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10969", }, { cve: "CVE-2020-11111", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11111", }, { cve: "CVE-2020-11112", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11112", }, { cve: "CVE-2020-11113", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11113", }, { cve: "CVE-2020-11612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11612", }, { cve: "CVE-2020-11619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11619", }, { cve: "CVE-2020-11620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11620", }, { cve: "CVE-2020-11979", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11979", }, { cve: "CVE-2020-12762", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12762", }, { cve: "CVE-2020-12825", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12825", }, { cve: "CVE-2020-13956", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-13956", }, { cve: "CVE-2020-14060", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14060", }, { cve: "CVE-2020-14061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14061", }, { cve: "CVE-2020-14062", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14062", }, { cve: "CVE-2020-14195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14195", }, { cve: "CVE-2020-15250", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-15250", }, { cve: "CVE-2020-1945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1945", }, { cve: "CVE-2020-1967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1967", }, { cve: "CVE-2020-1971", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1971", }, { cve: "CVE-2020-24616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24616", }, { cve: "CVE-2020-24750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24750", }, { cve: "CVE-2020-25649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25649", }, { cve: "CVE-2020-25658", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25658", }, { cve: "CVE-2020-26116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26116", }, { cve: "CVE-2020-26137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26137", }, { cve: "CVE-2020-26541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26541", }, { cve: "CVE-2020-27216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27216", }, { cve: "CVE-2020-27218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27218", }, { cve: "CVE-2020-27223", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27223", }, { cve: "CVE-2020-28366", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28366", }, { cve: "CVE-2020-28493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28493", }, { cve: "CVE-2020-29509", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29509", }, { cve: "CVE-2020-29511", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29511", }, { cve: "CVE-2020-29582", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29582", }, { cve: "CVE-2020-29651", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29651", }, { cve: "CVE-2020-35490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35490", }, { cve: "CVE-2020-35491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35491", }, { cve: "CVE-2020-35728", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35728", }, { cve: "CVE-2020-36179", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36179", }, { cve: "CVE-2020-36180", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36180", }, { cve: "CVE-2020-36181", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36181", }, { cve: "CVE-2020-36182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36182", }, { cve: "CVE-2020-36183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36183", }, { cve: "CVE-2020-36184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36184", }, { cve: "CVE-2020-36185", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36185", }, { cve: "CVE-2020-36186", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36186", }, { cve: "CVE-2020-36187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36187", }, { cve: "CVE-2020-36188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36188", }, { cve: "CVE-2020-36189", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36189", }, { cve: "CVE-2020-36516", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36516", }, { cve: "CVE-2020-36518", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36518", }, { cve: "CVE-2020-36557", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36557", }, { cve: "CVE-2020-36558", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36558", }, { cve: "CVE-2020-36691", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36691", }, { cve: "CVE-2020-7238", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-7238", }, { cve: "CVE-2020-8840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8840", }, { cve: "CVE-2020-8908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8908", }, { cve: "CVE-2020-8911", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8911", }, { cve: "CVE-2020-8912", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8912", }, { cve: "CVE-2020-9488", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9488", }, { cve: "CVE-2020-9493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9493", }, { cve: "CVE-2020-9546", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9546", }, { cve: "CVE-2020-9547", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9547", }, { cve: "CVE-2020-9548", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9548", }, { cve: "CVE-2021-20190", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20190", }, { cve: "CVE-2021-20323", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20323", }, { cve: "CVE-2021-21290", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21290", }, { cve: "CVE-2021-21295", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21295", }, { cve: "CVE-2021-21409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21409", }, { cve: "CVE-2021-23840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23840", }, { cve: "CVE-2021-23841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23841", }, { cve: "CVE-2021-2471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-2471", }, { cve: "CVE-2021-25642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-25642", }, { cve: "CVE-2021-26341", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-26341", }, { cve: "CVE-2021-27918", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-27918", }, { cve: "CVE-2021-28153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28153", }, { cve: "CVE-2021-28165", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28165", }, { cve: "CVE-2021-28169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28169", }, { cve: "CVE-2021-28861", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28861", }, { cve: "CVE-2021-29425", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-29425", }, { cve: "CVE-2021-30560", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-30560", }, { cve: "CVE-2021-3114", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3114", }, { cve: "CVE-2021-33036", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33036", }, { cve: "CVE-2021-33194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33194", }, { cve: "CVE-2021-33195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33195", }, { cve: "CVE-2021-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33196", }, { cve: "CVE-2021-33197", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33197", }, { cve: "CVE-2021-33503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33503", }, { cve: "CVE-2021-33655", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33655", }, { cve: "CVE-2021-33656", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33656", }, { cve: "CVE-2021-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3424", }, { cve: "CVE-2021-34428", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-34428", }, { cve: "CVE-2021-3449", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3449", }, { cve: "CVE-2021-3450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3450", }, { cve: "CVE-2021-3530", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3530", }, { cve: "CVE-2021-36221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36221", }, { cve: "CVE-2021-36373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36373", }, { cve: "CVE-2021-36374", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36374", }, { cve: "CVE-2021-3648", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3648", }, { cve: "CVE-2021-36690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36690", }, { cve: "CVE-2021-3711", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3711", }, { cve: "CVE-2021-3712", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3712", }, { cve: "CVE-2021-37136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37136", }, { cve: "CVE-2021-37137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37137", }, { cve: "CVE-2021-37404", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37404", }, { cve: "CVE-2021-37533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37533", }, { cve: "CVE-2021-3754", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3754", }, { cve: "CVE-2021-3778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3796", }, { cve: "CVE-2021-3826", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3826", }, { cve: "CVE-2021-3827", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3827", }, { cve: "CVE-2021-38297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-38297", }, { cve: "CVE-2021-3872", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3903", }, { cve: "CVE-2021-3923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3923", }, { cve: "CVE-2021-3927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4019", }, { cve: "CVE-2021-4037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4037", }, { cve: "CVE-2021-4069", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4069", }, { cve: "CVE-2021-4104", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4104", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-4157", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4157", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-41771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-41771", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4203", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4203", }, { cve: "CVE-2021-42567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-42567", }, { cve: "CVE-2021-43797", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-43797", }, { cve: "CVE-2021-44531", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44531", }, { cve: "CVE-2021-44532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44532", }, { cve: "CVE-2021-44533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44533", }, { cve: "CVE-2021-44716", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44716", }, { cve: "CVE-2021-44878", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44878", }, { cve: "CVE-2021-45078", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-45078", }, { cve: "CVE-2021-46195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46195", }, { cve: "CVE-2021-46828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46828", }, { cve: "CVE-2021-46848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46848", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2022-0213", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0213", }, { cve: "CVE-2022-0225", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0225", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0361", }, { cve: "CVE-2022-0392", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0407", }, { cve: "CVE-2022-0413", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0413", }, { cve: "CVE-2022-0561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0561", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-1184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1184", }, { cve: "CVE-2022-1245", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1245", }, { cve: "CVE-2022-1271", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1271", }, { cve: "CVE-2022-1292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1292", }, { cve: "CVE-2022-1381", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1420", }, { cve: "CVE-2022-1462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1462", }, { cve: "CVE-2022-1466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1466", }, { cve: "CVE-2022-1471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1471", }, { cve: "CVE-2022-1586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1586", }, { cve: "CVE-2022-1587", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1587", }, { cve: "CVE-2022-1616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1620", }, { cve: "CVE-2022-1679", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1679", }, { cve: "CVE-2022-1705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1705", }, { cve: "CVE-2022-1720", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1720", }, { cve: "CVE-2022-1729", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1729", }, { cve: "CVE-2022-1733", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1735", }, { cve: "CVE-2022-1771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1927", }, { cve: "CVE-2022-1962", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1962", }, { cve: "CVE-2022-1968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1968", }, { cve: "CVE-2022-1974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1974", }, { cve: "CVE-2022-1975", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1975", }, { cve: "CVE-2022-20132", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20132", }, { cve: "CVE-2022-20141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20141", }, { cve: "CVE-2022-20154", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20154", }, { cve: "CVE-2022-20166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20166", }, { cve: "CVE-2022-20368", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20368", }, { cve: "CVE-2022-20369", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20369", }, { cve: "CVE-2022-2047", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2047", }, { cve: "CVE-2022-2048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2048", }, { cve: "CVE-2022-20567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20567", }, { cve: "CVE-2022-2068", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2068", }, { cve: "CVE-2022-2097", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2097", }, { cve: "CVE-2022-21216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21216", }, { cve: "CVE-2022-21233", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21233", }, { cve: "CVE-2022-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2126", }, { cve: "CVE-2022-2129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2129", }, { cve: "CVE-2022-21363", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21363", }, { cve: "CVE-2022-21385", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21385", }, { cve: "CVE-2022-21499", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21499", }, { cve: "CVE-2022-2153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2153", }, { cve: "CVE-2022-21540", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21540", }, { cve: "CVE-2022-21541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21541", }, { cve: "CVE-2022-21549", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21549", }, { cve: "CVE-2022-21618", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21618", }, { cve: "CVE-2022-21619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21619", }, { cve: "CVE-2022-21624", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21624", }, { cve: "CVE-2022-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21626", }, { cve: "CVE-2022-21628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21628", }, { cve: "CVE-2022-21702", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21702", }, { cve: "CVE-2022-2175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2175", }, { cve: "CVE-2022-2182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2182", }, { cve: "CVE-2022-2183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2183", }, { cve: "CVE-2022-2206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2206", }, { cve: "CVE-2022-2207", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2207", }, { cve: "CVE-2022-2208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2208", }, { cve: "CVE-2022-2210", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2210", }, { cve: "CVE-2022-2231", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2231", }, { cve: "CVE-2022-2256", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2256", }, { cve: "CVE-2022-2257", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2257", }, { cve: "CVE-2022-2264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2264", }, { cve: "CVE-2022-2284", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2284", }, { cve: "CVE-2022-2285", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2285", }, { cve: "CVE-2022-2286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2286", }, { cve: "CVE-2022-2287", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2287", }, { cve: "CVE-2022-22976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22976", }, { cve: "CVE-2022-22978", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22978", }, { cve: "CVE-2022-2304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2304", }, { cve: "CVE-2022-2318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2318", }, { cve: "CVE-2022-23302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23302", }, { cve: "CVE-2022-23305", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23305", }, { cve: "CVE-2022-23307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23307", }, { cve: "CVE-2022-2343", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2343", }, { cve: "CVE-2022-2344", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2344", }, { cve: "CVE-2022-2345", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2345", }, { cve: "CVE-2022-23471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23471", }, { cve: "CVE-2022-23521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23521", }, { cve: "CVE-2022-23772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23772", }, { cve: "CVE-2022-23773", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23773", }, { cve: "CVE-2022-24302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24302", }, { cve: "CVE-2022-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24329", }, { cve: "CVE-2022-24823", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24823", }, { cve: "CVE-2022-24903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24903", }, { cve: "CVE-2022-2503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2503", }, { cve: "CVE-2022-25147", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25147", }, { cve: "CVE-2022-25168", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25168", }, { cve: "CVE-2022-2519", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2519", }, { cve: "CVE-2022-2520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2520", }, { cve: "CVE-2022-2521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2521", }, { cve: "CVE-2022-2522", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2522", }, { cve: "CVE-2022-25647", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25647", }, { cve: "CVE-2022-2571", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2571", }, { cve: "CVE-2022-2580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2580", }, { cve: "CVE-2022-2581", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2581", }, { cve: "CVE-2022-25857", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25857", }, { cve: "CVE-2022-2588", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2588", }, { cve: "CVE-2022-2598", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2598", }, { cve: "CVE-2022-26148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26148", }, { cve: "CVE-2022-26365", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26365", }, { cve: "CVE-2022-26373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26373", }, { cve: "CVE-2022-2639", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2639", }, { cve: "CVE-2022-26612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26612", }, { cve: "CVE-2022-2663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2663", }, { cve: "CVE-2022-27781", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27781", }, { cve: "CVE-2022-27782", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27782", }, { cve: "CVE-2022-27943", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27943", }, { cve: "CVE-2022-2795", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2795", }, { cve: "CVE-2022-28131", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28131", }, { cve: "CVE-2022-2816", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2816", }, { cve: "CVE-2022-2817", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2817", }, { cve: "CVE-2022-2819", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2819", }, { cve: "CVE-2022-28327", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28327", }, { cve: "CVE-2022-2845", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2845", }, { cve: "CVE-2022-2849", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2849", }, { cve: "CVE-2022-2862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2862", }, { cve: "CVE-2022-2867", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2867", }, { cve: "CVE-2022-2868", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2868", }, { cve: "CVE-2022-2869", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2869", }, { cve: "CVE-2022-28693", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28693", }, { cve: "CVE-2022-2874", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2874", }, { cve: "CVE-2022-28748", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28748", }, { cve: "CVE-2022-2880", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2880", }, { cve: "CVE-2022-2889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2889", }, { cve: "CVE-2022-29162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29162", }, { cve: "CVE-2022-29187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29187", }, { cve: "CVE-2022-2923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2923", }, { cve: "CVE-2022-2946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2946", }, { cve: "CVE-2022-29526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29526", }, { cve: "CVE-2022-29583", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29583", }, { cve: "CVE-2022-2964", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2964", }, { cve: "CVE-2022-2977", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2977", }, { cve: "CVE-2022-2980", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2980", }, { cve: "CVE-2022-2982", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2982", }, { cve: "CVE-2022-29900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29900", }, { cve: "CVE-2022-29901", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29901", }, { cve: "CVE-2022-2991", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2991", }, { cve: "CVE-2022-3016", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3016", }, { cve: "CVE-2022-3028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3028", }, { cve: "CVE-2022-3037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3037", }, { cve: "CVE-2022-30580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30580", }, { cve: "CVE-2022-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30630", }, { cve: "CVE-2022-30631", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30631", }, { cve: "CVE-2022-30632", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30632", }, { cve: "CVE-2022-30633", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30633", }, { cve: "CVE-2022-3099", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3099", }, { cve: "CVE-2022-31030", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31030", }, { cve: "CVE-2022-31159", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31159", }, { cve: "CVE-2022-3134", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3134", }, { cve: "CVE-2022-3153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3153", }, { cve: "CVE-2022-3169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3169", }, { cve: "CVE-2022-31690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31690", }, { cve: "CVE-2022-32148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32148", }, { cve: "CVE-2022-32149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32149", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32221", }, { cve: "CVE-2022-3234", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3234", }, { cve: "CVE-2022-3235", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3235", }, { cve: "CVE-2022-3239", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3239", }, { cve: "CVE-2022-3278", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3278", }, { cve: "CVE-2022-3296", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3296", }, { cve: "CVE-2022-3297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3297", }, { cve: "CVE-2022-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33196", }, { cve: "CVE-2022-3324", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3324", }, { cve: "CVE-2022-3352", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3352", }, { cve: "CVE-2022-33740", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33740", }, { cve: "CVE-2022-33741", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33741", }, { cve: "CVE-2022-33742", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33742", }, { cve: "CVE-2022-33972", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33972", }, { cve: "CVE-2022-33981", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33981", }, { cve: "CVE-2022-34169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34169", }, { cve: "CVE-2022-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3424", }, { cve: "CVE-2022-34266", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34266", }, { cve: "CVE-2022-34526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34526", }, { cve: "CVE-2022-34903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34903", }, { cve: "CVE-2022-3491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3491", }, { cve: "CVE-2022-3515", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3515", }, { cve: "CVE-2022-3520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3520", }, { cve: "CVE-2022-3521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3521", }, { cve: "CVE-2022-3524", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3524", }, { cve: "CVE-2022-35252", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35252", }, { cve: "CVE-2022-3542", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3542", }, { cve: "CVE-2022-3545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3545", }, { cve: "CVE-2022-3564", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3564", }, { cve: "CVE-2022-3565", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3565", }, { cve: "CVE-2022-3566", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3566", }, { cve: "CVE-2022-3567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3567", }, { cve: "CVE-2022-35737", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35737", }, { cve: "CVE-2022-3586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3586", }, { cve: "CVE-2022-3591", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3591", }, { cve: "CVE-2022-3594", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3594", }, { cve: "CVE-2022-3597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3597", }, { cve: "CVE-2022-3599", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3599", }, { cve: "CVE-2022-36109", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36109", }, { cve: "CVE-2022-3621", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3621", }, { cve: "CVE-2022-3626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3626", }, { cve: "CVE-2022-3627", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3627", }, { cve: "CVE-2022-3628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3628", }, { cve: "CVE-2022-36280", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36280", }, { cve: "CVE-2022-3629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3629", }, { cve: "CVE-2022-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3635", }, { cve: "CVE-2022-3643", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3643", }, { cve: "CVE-2022-36437", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36437", }, { cve: "CVE-2022-3646", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3646", }, { cve: "CVE-2022-3649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3649", }, { cve: "CVE-2022-36760", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36760", }, { cve: "CVE-2022-36879", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36879", }, { cve: "CVE-2022-36946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36946", }, { cve: "CVE-2022-3705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3705", }, { cve: "CVE-2022-37434", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37434", }, { cve: "CVE-2022-37436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37436", }, { cve: "CVE-2022-37865", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37865", }, { cve: "CVE-2022-37866", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37866", }, { cve: "CVE-2022-38090", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38090", }, { cve: "CVE-2022-38096", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38096", }, { cve: "CVE-2022-38126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38126", }, { cve: "CVE-2022-38127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38127", }, { cve: "CVE-2022-38177", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38177", }, { cve: "CVE-2022-38178", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38178", }, { cve: "CVE-2022-3821", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3821", }, { cve: "CVE-2022-38533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38533", }, { cve: "CVE-2022-38749", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38749", }, { cve: "CVE-2022-38750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38750", }, { cve: "CVE-2022-38751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38751", }, { cve: "CVE-2022-38752", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38752", }, { cve: "CVE-2022-39028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39028", }, { cve: "CVE-2022-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3903", }, { cve: "CVE-2022-39188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39188", }, { cve: "CVE-2022-39399", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39399", }, { cve: "CVE-2022-3970", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3970", }, { cve: "CVE-2022-40149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40149", }, { cve: "CVE-2022-40150", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40150", }, { cve: "CVE-2022-40151", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40151", }, { cve: "CVE-2022-40152", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40152", }, { cve: "CVE-2022-40153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40153", }, { cve: "CVE-2022-40303", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40303", }, { cve: "CVE-2022-40304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40304", }, { cve: "CVE-2022-40307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40307", }, { cve: "CVE-2022-40674", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40674", }, { cve: "CVE-2022-40768", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40768", }, { cve: "CVE-2022-40899", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40899", }, { cve: "CVE-2022-4095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4095", }, { cve: "CVE-2022-41218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41218", }, { cve: "CVE-2022-4129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4129", }, { cve: "CVE-2022-4141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4141", }, { cve: "CVE-2022-41717", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41717", }, { cve: "CVE-2022-41721", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41721", }, { cve: "CVE-2022-41848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41848", }, { cve: "CVE-2022-41850", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41850", }, { cve: "CVE-2022-41854", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41854", }, { cve: "CVE-2022-41858", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41858", }, { cve: "CVE-2022-41881", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41881", }, { cve: "CVE-2022-41903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41903", }, { cve: "CVE-2022-41915", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41915", }, { cve: "CVE-2022-41966", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41966", }, { cve: "CVE-2022-41974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41974", }, { cve: "CVE-2022-42003", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42003", }, { cve: "CVE-2022-42004", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42004", }, { cve: "CVE-2022-42010", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42010", }, { cve: "CVE-2022-42011", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42011", }, { cve: "CVE-2022-42012", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42012", }, { cve: "CVE-2022-42328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42328", }, { cve: "CVE-2022-42329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42329", }, { cve: "CVE-2022-42703", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42703", }, { cve: "CVE-2022-42889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42889", }, { cve: "CVE-2022-42895", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42895", }, { cve: "CVE-2022-42896", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42896", }, { cve: "CVE-2022-42898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42898", }, { cve: "CVE-2022-4292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4292", }, { cve: "CVE-2022-4293", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4293", }, { cve: "CVE-2022-42969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42969", }, { cve: "CVE-2022-4304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4304", }, { cve: "CVE-2022-43552", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43552", }, { cve: "CVE-2022-43680", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43680", }, { cve: "CVE-2022-43750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43750", }, { cve: "CVE-2022-4378", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4378", }, { cve: "CVE-2022-43945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43945", }, { cve: "CVE-2022-43995", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43995", }, { cve: "CVE-2022-4415", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4415", }, { cve: "CVE-2022-4450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4450", }, { cve: "CVE-2022-44638", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-44638", }, { cve: "CVE-2022-45061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45061", }, { cve: "CVE-2022-45688", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45688", }, { cve: "CVE-2022-45884", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45884", }, { cve: "CVE-2022-45885", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45885", }, { cve: "CVE-2022-45886", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45886", }, { cve: "CVE-2022-45887", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45887", }, { cve: "CVE-2022-45919", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45919", }, { cve: "CVE-2022-45934", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45934", }, { cve: "CVE-2022-45939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45939", }, { cve: "CVE-2022-4662", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4662", }, { cve: "CVE-2022-46751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46751", }, { cve: "CVE-2022-46908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46908", }, { cve: "CVE-2022-47629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47629", }, { cve: "CVE-2022-47929", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47929", }, { cve: "CVE-2022-48281", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48281", }, { cve: "CVE-2022-48337", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48337", }, { cve: "CVE-2022-48339", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48339", }, { cve: "CVE-2023-0045", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0045", }, { cve: "CVE-2023-0049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0049", }, { cve: "CVE-2023-0051", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0051", }, { cve: "CVE-2023-0054", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0054", }, { cve: "CVE-2023-0215", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0215", }, { cve: "CVE-2023-0286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0286", }, { cve: "CVE-2023-0288", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0288", }, { cve: "CVE-2023-0433", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0433", }, { cve: "CVE-2023-0464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0464", }, { cve: "CVE-2023-0465", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0465", }, { cve: "CVE-2023-0466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0466", }, { cve: "CVE-2023-0512", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0512", }, { cve: "CVE-2023-0590", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0590", }, { cve: "CVE-2023-0597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0597", }, { cve: "CVE-2023-0833", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0833", }, { cve: "CVE-2023-1076", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1076", }, { cve: "CVE-2023-1095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1095", }, { cve: "CVE-2023-1118", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1118", }, { cve: "CVE-2023-1127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1127", }, { cve: "CVE-2023-1170", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1170", }, { cve: "CVE-2023-1175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1175", }, { cve: "CVE-2023-1370", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1370", }, { cve: "CVE-2023-1380", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1380", }, { cve: "CVE-2023-1390", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1390", }, { cve: "CVE-2023-1436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1436", }, { cve: "CVE-2023-1513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1513", }, { cve: "CVE-2023-1611", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1611", }, { cve: "CVE-2023-1670", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1670", }, { cve: "CVE-2023-1855", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1855", }, { cve: "CVE-2023-1989", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1989", }, { cve: "CVE-2023-1990", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1990", }, { cve: "CVE-2023-1998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1998", }, { cve: "CVE-2023-20862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-20862", }, { cve: "CVE-2023-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2124", }, { cve: "CVE-2023-2162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2162", }, { cve: "CVE-2023-2176", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2176", }, { cve: "CVE-2023-21830", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21830", }, { cve: "CVE-2023-21835", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21835", }, { cve: "CVE-2023-21843", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21843", }, { cve: "CVE-2023-21930", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21930", }, { cve: "CVE-2023-21937", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21937", }, { cve: "CVE-2023-21938", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21938", }, { cve: "CVE-2023-21939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21939", }, { cve: "CVE-2023-2194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2194", }, { cve: "CVE-2023-21954", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21954", }, { cve: "CVE-2023-21967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21967", }, { cve: "CVE-2023-21968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21968", }, { cve: "CVE-2023-22490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22490", }, { cve: "CVE-2023-2253", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2253", }, { cve: "CVE-2023-22809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22809", }, { cve: "CVE-2023-23454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23454", }, { cve: "CVE-2023-23455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23455", }, { cve: "CVE-2023-23559", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23559", }, { cve: "CVE-2023-23916", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23916", }, { cve: "CVE-2023-23946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23946", }, { cve: "CVE-2023-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24329", }, { cve: "CVE-2023-24532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24532", }, { cve: "CVE-2023-24534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24534", }, { cve: "CVE-2023-2483", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2483", }, { cve: "CVE-2023-24998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24998", }, { cve: "CVE-2023-2513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2513", }, { cve: "CVE-2023-25193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25193", }, { cve: "CVE-2023-25652", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25652", }, { cve: "CVE-2023-25690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25690", }, { cve: "CVE-2023-25809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25809", }, { cve: "CVE-2023-25815", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25815", }, { cve: "CVE-2023-26048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26048", }, { cve: "CVE-2023-26049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26049", }, { cve: "CVE-2023-2650", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2650", }, { cve: "CVE-2023-26545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26545", }, { cve: "CVE-2023-26604", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26604", }, { cve: "CVE-2023-27533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27533", }, { cve: "CVE-2023-27534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27534", }, { cve: "CVE-2023-27535", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27535", }, { cve: "CVE-2023-27536", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27536", }, { cve: "CVE-2023-27538", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27538", }, { cve: "CVE-2023-27561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27561", }, { cve: "CVE-2023-2828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2828", }, { cve: "CVE-2023-28320", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28320", }, { cve: "CVE-2023-28321", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28321", }, { cve: "CVE-2023-28322", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28322", }, { cve: "CVE-2023-28328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28328", }, { cve: "CVE-2023-28464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28464", }, { cve: "CVE-2023-28486", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28486", }, { cve: "CVE-2023-28487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28487", }, { cve: "CVE-2023-28642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28642", }, { cve: "CVE-2023-28772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28772", }, { cve: "CVE-2023-28840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28840", }, { cve: "CVE-2023-28841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28841", }, { cve: "CVE-2023-28842", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28842", }, { cve: "CVE-2023-29007", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29007", }, { cve: "CVE-2023-29383", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29383", }, { cve: "CVE-2023-29402", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29402", }, { cve: "CVE-2023-29406", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29406", }, { cve: "CVE-2023-29409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29409", }, { cve: "CVE-2023-2976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2976", }, { cve: "CVE-2023-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30630", }, { cve: "CVE-2023-30772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30772", }, { cve: "CVE-2023-31084", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31084", }, { cve: "CVE-2023-3138", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3138", }, { cve: "CVE-2023-31436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31436", }, { cve: "CVE-2023-31484", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31484", }, { cve: "CVE-2023-32269", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32269", }, { cve: "CVE-2023-32697", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32697", }, { cve: "CVE-2023-33264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-33264", }, { cve: "CVE-2023-34034", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34034", }, { cve: "CVE-2023-34035", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34035", }, { cve: "CVE-2023-34453", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34453", }, { cve: "CVE-2023-34454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34454", }, { cve: "CVE-2023-34455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34455", }, { cve: "CVE-2023-34462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34462", }, { cve: "CVE-2023-35116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-35116", }, { cve: "CVE-2023-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3635", }, { cve: "CVE-2023-36479", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-36479", }, { cve: "CVE-2023-39533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-39533", }, { cve: "CVE-2023-40167", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40167", }, { cve: "CVE-2023-40217", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40217", }, { cve: "CVE-2023-41105", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41105", }, { cve: "CVE-2023-41900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41900", }, { cve: "CVE-2023-43642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43642", }, { cve: "CVE-2023-43804", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43804", }, { cve: "CVE-2023-44487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-44487", }, { cve: "CVE-2023-45803", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-45803", }, { cve: "CVE-2024-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2024-21626", }, ], }
gsd-2022-1927
Vulnerability from gsd
{ GSD: { alias: "CVE-2022-1927", description: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", id: "GSD-2022-1927", references: [ "https://advisories.mageia.org/CVE-2022-1927.html", "https://www.suse.com/security/cve/CVE-2022-1927.html", "https://alas.aws.amazon.com/cve/html/CVE-2022-1927.html", "https://access.redhat.com/errata/RHSA-2022:5813", "https://access.redhat.com/errata/RHSA-2022:5942", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2022-1927", ], details: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", id: "GSD-2022-1927", modified: "2023-12-13T01:19:28.497462Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-1927", STATE: "PUBLIC", TITLE: "Buffer Over-read in vim/vim", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "vim/vim", version: { version_data: [ { version_affected: "<", version_value: "8.2", }, ], }, }, ], }, vendor_name: "vim", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-126 Buffer Over-read", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", refsource: "CONFIRM", url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", }, { name: "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010", refsource: "MISC", url: "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010", }, { name: "FEDORA-2022-5ce148636b", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/", }, { name: "FEDORA-2022-d94440bf0e", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/", }, { name: "FEDORA-2022-bb2daad935", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/", }, { name: "GLSA-202208-32", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202208-32", }, { name: "https://support.apple.com/kb/HT213488", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT213488", }, { name: "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { name: "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { name: "GLSA-202305-16", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202305-16", }, ], }, source: { advisory: "945107ef-0b27-41c7-a03c-db99def0e777", discovery: "EXTERNAL", }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.2.5037", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "13.0", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-1927", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-126", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", refsource: "CONFIRM", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", }, { name: "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010", }, { name: "FEDORA-2022-5ce148636b", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/", }, { name: "FEDORA-2022-d94440bf0e", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/", }, { name: "FEDORA-2022-bb2daad935", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/", }, { name: "GLSA-202208-32", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-32", }, { name: "https://support.apple.com/kb/HT213488", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213488", }, { name: "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13", refsource: "FULLDISC", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { name: "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13", refsource: "FULLDISC", tags: [], url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { name: "GLSA-202305-16", refsource: "GENTOO", tags: [], url: "https://security.gentoo.org/glsa/202305-16", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: true, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, }, }, lastModifiedDate: "2023-05-03T12:15Z", publishedDate: "2022-05-29T14:15Z", }, }, }
suse-su-2022:4619-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for vim", title: "Title of the patch", }, { category: "description", text: "This update for vim fixes the following issues:\n\nUpdated to version 9.0.0814:\n\n * Fixing bsc#1192478 VUL-1: CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow\n * Fixing bsc#1203508 VUL-0: CVE-2022-3234: vim: Heap-based Buffer Overflow prior to 9.0.0483.\n * Fixing bsc#1203509 VUL-1: CVE-2022-3235: vim: Use After Free in GitHub prior to 9.0.0490.\n * Fixing bsc#1203820 VUL-0: CVE-2022-3324: vim: Stack-based Buffer Overflow in prior to 9.0.0598.\n * Fixing bsc#1204779 VUL-0: CVE-2022-3705: vim: use after free in function qf_update_buffer of the file quickfix.c\n * Fixing bsc#1203152 VUL-1: CVE-2022-2982: vim: use after free in qf_fill_buffer()\n * Fixing bsc#1203796 VUL-1: CVE-2022-3296: vim: stack out of bounds read in ex_finally() in ex_eval.c\n * Fixing bsc#1203797 VUL-1: CVE-2022-3297: vim: use-after-free in process_next_cpt_value() at insexpand.c\n * Fixing bsc#1203110 VUL-1: CVE-2022-3099: vim: Use After Free in ex_docmd.c\n * Fixing bsc#1203194 VUL-1: CVE-2022-3134: vim: use after free in do_tag()\n * Fixing bsc#1203272 VUL-1: CVE-2022-3153: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.\n * Fixing bsc#1203799 VUL-1: CVE-2022-3278: vim: NULL pointer dereference in eval_next_non_blank() in eval.c\n * Fixing bsc#1203924 VUL-1: CVE-2022-3352: vim: vim: use after free\n * Fixing bsc#1203155 VUL-1: CVE-2022-2980: vim: null pointer dereference in do_mouse()\n * Fixing bsc#1202962 VUL-1: CVE-2022-3037: vim: Use After Free in vim prior to 9.0.0321\n * Fixing bsc#1200884 Vim: Error on startup\n * Fixing bsc#1200902 VUL-0: CVE-2022-2183: vim: Out-of-bounds Read through get_lisp_indent() Mon 13:32\n * Fixing bsc#1200903 VUL-0: CVE-2022-2182: vim: Heap-based Buffer Overflow through parse_cmd_address() Tue 08:37\n * Fixing bsc#1200904 VUL-0: CVE-2022-2175: vim: Buffer Over-read through cmdline_insert_reg() Tue 08:37\n * Fixing bsc#1201249 VUL-0: CVE-2022-2304: vim: stack buffer overflow in spell_dump_compl()\n * Fixing bsc#1201356 VUL-1: CVE-2022-2343: vim: Heap-based Buffer Overflow in GitHub repository vim prior to 9.0.0044\n * Fixing bsc#1201359 VUL-1: CVE-2022-2344: vim: Another Heap-based Buffer Overflow vim prior to 9.0.0045\n * Fixing bsc#1201363 VUL-1: CVE-2022-2345: vim: Use After Free in GitHub repository vim prior to 9.0.0046.\n * Fixing bsc#1201620 vim: SLE-15-SP4-Full-x86_64-GM-Media1 and vim-plugin-tlib-1.27-bp154.2.18.noarch issue\n * Fixing bsc#1202414 VUL-1: CVE-2022-2819: vim: Heap-based Buffer Overflow in compile_lock_unlock()\n * Fixing bsc#1202552 VUL-1: CVE-2022-2874: vim: NULL Pointer Dereference in generate_loadvar()\n * Fixing bsc#1200270 VUL-1: CVE-2022-1968: vim: use after free in utf_ptr2char\n * Fixing bsc#1200697 VUL-1: CVE-2022-2124: vim: out of bounds read in current_quote()\n * Fixing bsc#1200698 VUL-1: CVE-2022-2125: vim: out of bounds read in get_lisp_indent()\n * Fixing bsc#1200700 VUL-1: CVE-2022-2126: vim: out of bounds read in suggest_trie_walk()\n * Fixing bsc#1200701 VUL-1: CVE-2022-2129: vim: out of bounds write in vim_regsub_both()\n * Fixing bsc#1200732 VUL-1: CVE-2022-1720: vim: out of bounds read in grab_file_name()\n * Fixing bsc#1201132 VUL-1: CVE-2022-2264: vim: out of bounds read in inc()\n * Fixing bsc#1201133 VUL-1: CVE-2022-2284: vim: out of bounds read in utfc_ptr2len()\n * Fixing bsc#1201134 VUL-1: CVE-2022-2285: vim: negative size passed to memmove() due to integer overflow\n * Fixing bsc#1201135 VUL-1: CVE-2022-2286: vim: out of bounds read in ins_bytes()\n * Fixing bsc#1201136 VUL-1: CVE-2022-2287: vim: out of bounds read in suggest_trie_walk()\n * Fixing bsc#1201150 VUL-1: CVE-2022-2231: vim: null pointer dereference skipwhite()\n * Fixing bsc#1201151 VUL-1: CVE-2022-2210: vim: out of bounds read in ml_append_int()\n * Fixing bsc#1201152 VUL-1: CVE-2022-2208: vim: null pointer dereference in diff_check()\n * Fixing bsc#1201153 VUL-1: CVE-2022-2207: vim: out of bounds read in ins_bs()\n * Fixing bsc#1201154 VUL-1: CVE-2022-2257: vim: out of bounds read in msg_outtrans_special()\n * Fixing bsc#1201155 VUL-1: CVE-2022-2206: vim: out of bounds read in msg_outtrans_attr()\n * Fixing bsc#1201863 VUL-1: CVE-2022-2522: vim: out of bounds read via nested autocommand\n * Fixing bsc#1202046 VUL-1: CVE-2022-2571: vim: Heap-based Buffer Overflow related to ins_comp_get_next_word_or_line()\n * Fixing bsc#1202049 VUL-1: CVE-2022-2580: vim: Heap-based Buffer Overflow related to eval_string()\n * Fixing bsc#1202050 VUL-1: CVE-2022-2581: vim: Out-of-bounds Read related to cstrchr()\n * Fixing bsc#1202051 VUL-1: CVE-2022-2598: vim: Undefined Behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput()\n * Fixing bsc#1202420 VUL-1: CVE-2022-2817: vim: Use After Free in f_assert_fails()\n * Fixing bsc#1202421 VUL-1: CVE-2022-2816: vim: Out-of-bounds Read in check_vim9_unlet()\n * Fixing bsc#1202511 VUL-1: CVE-2022-2862: vim: use-after-free in compile_nested_function()\n * Fixing bsc#1202512 VUL-1: CVE-2022-2849: vim: Invalid memory access related to mb_ptr2len()\n * Fixing bsc#1202515 VUL-1: CVE-2022-2845: vim: Buffer Over-read related to display_dollar()\n * Fixing bsc#1202599 VUL-1: CVE-2022-2889: vim: use-after-free in find_var_also_in_script() in evalvars.c\n * Fixing bsc#1202687 VUL-1: CVE-2022-2923: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240\n * Fixing bsc#1202689 VUL-1: CVE-2022-2946: vim: use after free in function vim_vsnprintf_typval\n * Fixing bsc#1202862 VUL-1: CVE-2022-3016: vim: Use After Free in vim prior to 9.0.0285 Mon 12:00\n * Fixing bsc#1191770 VUL-0: CVE-2021-3875: vim: heap-based buffer overflow \n * Fixing bsc#1192167 VUL-0: CVE-2021-3903: vim: heap-based buffer overflow \n * Fixing bsc#1192902 VUL-0: CVE-2021-3968: vim: vim is vulnerable to \n Heap-based Buffer Overflow \n * Fixing bsc#1192903 VUL-0: CVE-2021-3973: vim: vim is vulnerable to \n Heap-based Buffer Overflow \n * Fixing bsc#1192904 VUL-0: CVE-2021-3974: vim: vim is vulnerable to Use\n After Free \n * Fixing bsc#1193466 VUL-1: CVE-2021-4069: vim: use-after-free in ex_open()\n in src/ex_docmd.c \n * Fixing bsc#1193905 VUL-0: CVE-2021-4136: vim: vim is vulnerable to\n Heap-based Buffer Overflow \n * Fixing bsc#1194093 VUL-1: CVE-2021-4166: vim: vim is vulnerable to\n Out-of-bounds Read \n * Fixing bsc#1194216 VUL-1: CVE-2021-4193: vim: vulnerable to \n Out-of-bounds Read \n * Fixing bsc#1194217 VUL-0: CVE-2021-4192: vim: vulnerable to Use After Free\n * Fixing bsc#1194872 VUL-0: CVE-2022-0261: vim: Heap-based Buffer Overflow\n in vim prior to 8.2. \n * Fixing bsc#1194885 VUL-0: CVE-2022-0213: vim: vim is vulnerable to\n Heap-based Buffer Overflow \n * Fixing bsc#1195004 VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in\n vim prior to 8.2. \n * Fixing bsc#1195203 VUL-0: CVE-2022-0359: vim: heap-based buffer overflow in\n init_ccline() in ex_getln.c \n * Fixing bsc#1195354 VUL-0: CVE-2022-0407: vim: Heap-based Buffer Overflow in\n Conda vim prior to 8.2. \n * Fixing bsc#1198596 VUL-0: CVE-2022-1381: vim: global heap buffer overflow\n in skip_range \n * Fixing bsc#1199331 VUL-0: CVE-2022-1616: vim: Use after free in\n append_command \n * Fixing bsc#1199333 VUL-0: CVE-2022-1619: vim: Heap-based Buffer Overflow in\n function cmdline_erase_chars \n * Fixing bsc#1199334 VUL-0: CVE-2022-1620: vim: NULL Pointer Dereference in\n function vim_regexec_string \n * Fixing bsc#1199747 VUL-0: CVE-2022-1796: vim: Use After in\n find_pattern_in_path \n * Fixing bsc#1200010 VUL-0: CVE-2022-1897: vim: Out-of-bounds Write in vim \n * Fixing bsc#1200011 VUL-0: CVE-2022-1898: vim: Use After Free in vim prior\n to 8.2 \n * Fixing bsc#1200012 VUL-0: CVE-2022-1927: vim: Buffer Over-read in vim prior\n to 8.2 \n * Fixing bsc#1070955 VUL-1: CVE-2017-17087: vim: Sets the group ownership of a\n .swp file to the editor's primary group, which allows local users to obtain\n sensitive information \n * Fixing bsc#1194388 VUL-1: CVE-2022-0128: vim: vim is vulnerable to\n Out-of-bounds Read \n * Fixing bsc#1195332 VUL-1: CVE-2022-0392: vim: Heap-based Buffer Overflow\n in vim prior to 8.2 \n * Fixing bsc#1196361 VUL-1: CVE-2022-0696: vim: NULL Pointer Dereference in\n vim prior to 8.2 \n * Fixing bsc#1198748 VUL-1: CVE-2022-1420: vim: Out-of-range Pointer Offset \n * Fixing bsc#1199651 VUL-1: CVE-2022-1735: vim: heap buffer overflow \n * Fixing bsc#1199655 VUL-1: CVE-2022-1733: vim: Heap-based Buffer Overflow in\n cindent.c \n * Fixing bsc#1199693 VUL-1: CVE-2022-1771: vim: stack exhaustion in vim prior\n to 8.2. \n * Fixing bsc#1199745 VUL-1: CVE-2022-1785: vim: Out-of-bounds Write \n * Fixing bsc#1199936 VUL-1: CVE-2022-1851: vim: out of bounds read \n * Fixing bsc#1195004 - (CVE-2022-0318) VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in vim prior to 8.2.\n * Fixing bsc#1190570 CVE-2021-3796: vim: use-after-free in nv_replace() in normal.c\n * Fixing bsc#1191893 CVE-2021-3872: vim: heap-based buffer overflow in win_redr_status() drawscreen.c\n * Fixing bsc#1192481 CVE-2021-3927: vim: vim is vulnerable to Heap-based Buffer Overflow\n * Fixing bsc#1192478 CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow\n * Fixing bsc#1193294 CVE-2021-4019: vim: vim is vulnerable to Heap-based Buffer Overflow\n * Fixing bsc#1193298 CVE-2021-3984: vim: illegal memory access when C-indenting could lead to Heap Buffer Overflow\n * Fixing bsc#1190533 CVE-2021-3778: vim: Heap-based Buffer Overflow in regexp_nfa.c\n * Fixing bsc#1194216 CVE-2021-4193: vim: vulnerable to Out-of-bounds Read\n * Fixing bsc#1194556 CVE-2021-46059: vim: A Pointer Dereference vulnerability \n exists in Vim 8.2.3883 via the vim_regexec_multi function at regexp.c, which causes a denial of service. \n * Fixing bsc#1195066 CVE-2022-0319: vim: Out-of-bounds Read in vim/vim prior to 8.2.\n * Fixing bsc#1195126 CVE-2022-0351: vim: uncontrolled recursion in eval7()\n * Fixing bsc#1195202 CVE-2022-0361: vim: Heap-based Buffer Overflow in vim prior to 8.2.\n * Fixing bsc#1195356 CVE-2022-0413: vim: use after free in src/ex_cmds.c\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-4619,SUSE-OpenStack-Cloud-9-2022-4619,SUSE-OpenStack-Cloud-Crowbar-9-2022-4619,SUSE-SLE-SAP-12-SP4-2022-4619,SUSE-SLE-SERVER-12-SP2-BCL-2022-4619,SUSE-SLE-SERVER-12-SP3-BCL-2022-4619,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4619,SUSE-SLE-SERVER-12-SP5-2022-4619", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4619-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:4619-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20224619-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:4619-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html", }, { category: "self", summary: "SUSE Bug 1070955", url: "https://bugzilla.suse.com/1070955", }, { category: "self", summary: "SUSE Bug 1173256", url: "https://bugzilla.suse.com/1173256", }, { category: "self", summary: "SUSE Bug 1174564", url: "https://bugzilla.suse.com/1174564", }, { category: "self", summary: "SUSE Bug 1176549", url: "https://bugzilla.suse.com/1176549", }, { category: "self", summary: "SUSE Bug 1182324", url: "https://bugzilla.suse.com/1182324", }, { category: "self", summary: "SUSE Bug 1190533", url: "https://bugzilla.suse.com/1190533", }, { category: "self", summary: "SUSE Bug 1190570", url: "https://bugzilla.suse.com/1190570", }, { category: "self", summary: "SUSE Bug 1191770", url: "https://bugzilla.suse.com/1191770", }, { category: "self", summary: "SUSE Bug 1191893", url: "https://bugzilla.suse.com/1191893", }, { category: "self", summary: "SUSE Bug 1192167", url: "https://bugzilla.suse.com/1192167", }, { category: "self", summary: "SUSE Bug 1192478", url: "https://bugzilla.suse.com/1192478", }, { category: "self", summary: "SUSE Bug 1192481", url: "https://bugzilla.suse.com/1192481", }, { category: "self", summary: "SUSE Bug 1192902", url: "https://bugzilla.suse.com/1192902", }, { category: "self", summary: "SUSE Bug 1192903", url: "https://bugzilla.suse.com/1192903", }, { category: "self", summary: "SUSE Bug 1192904", url: "https://bugzilla.suse.com/1192904", }, { category: "self", summary: "SUSE Bug 1193294", url: "https://bugzilla.suse.com/1193294", }, { category: "self", summary: "SUSE Bug 1193298", url: "https://bugzilla.suse.com/1193298", }, { category: "self", summary: "SUSE Bug 1193466", url: "https://bugzilla.suse.com/1193466", }, { category: "self", summary: "SUSE Bug 1193905", url: "https://bugzilla.suse.com/1193905", }, { category: "self", summary: "SUSE Bug 1194093", url: "https://bugzilla.suse.com/1194093", }, { category: "self", summary: "SUSE Bug 1194216", url: "https://bugzilla.suse.com/1194216", }, { category: "self", summary: "SUSE Bug 1194217", url: "https://bugzilla.suse.com/1194217", }, { category: "self", summary: "SUSE Bug 1194388", url: "https://bugzilla.suse.com/1194388", }, { category: "self", summary: "SUSE Bug 1194556", url: "https://bugzilla.suse.com/1194556", }, { category: "self", summary: "SUSE Bug 1194872", url: "https://bugzilla.suse.com/1194872", }, { category: "self", summary: "SUSE Bug 1194885", url: "https://bugzilla.suse.com/1194885", }, { category: "self", summary: "SUSE Bug 1195004", url: "https://bugzilla.suse.com/1195004", }, { category: "self", summary: "SUSE Bug 1195066", url: "https://bugzilla.suse.com/1195066", }, { category: "self", summary: "SUSE Bug 1195126", url: "https://bugzilla.suse.com/1195126", }, { category: "self", summary: "SUSE Bug 1195202", url: "https://bugzilla.suse.com/1195202", }, { category: "self", summary: "SUSE Bug 1195203", url: "https://bugzilla.suse.com/1195203", }, { category: "self", summary: "SUSE Bug 1195332", url: "https://bugzilla.suse.com/1195332", }, { category: "self", summary: "SUSE Bug 1195354", url: "https://bugzilla.suse.com/1195354", }, { category: "self", summary: "SUSE Bug 1195356", url: "https://bugzilla.suse.com/1195356", }, { category: "self", summary: "SUSE Bug 1196361", url: "https://bugzilla.suse.com/1196361", }, { category: "self", summary: "SUSE Bug 1198596", url: "https://bugzilla.suse.com/1198596", }, { category: "self", summary: "SUSE Bug 1198748", url: "https://bugzilla.suse.com/1198748", }, { category: "self", summary: "SUSE Bug 1199331", url: "https://bugzilla.suse.com/1199331", }, { category: "self", summary: "SUSE Bug 1199333", url: "https://bugzilla.suse.com/1199333", }, { category: "self", summary: "SUSE Bug 1199334", url: "https://bugzilla.suse.com/1199334", }, { category: "self", summary: "SUSE Bug 1199651", url: "https://bugzilla.suse.com/1199651", }, { category: "self", summary: "SUSE Bug 1199655", url: "https://bugzilla.suse.com/1199655", }, { category: "self", summary: "SUSE Bug 1199693", url: "https://bugzilla.suse.com/1199693", }, { category: "self", summary: "SUSE Bug 1199745", url: "https://bugzilla.suse.com/1199745", }, { category: "self", summary: "SUSE Bug 1199747", url: "https://bugzilla.suse.com/1199747", }, { category: "self", summary: "SUSE Bug 1199936", url: "https://bugzilla.suse.com/1199936", }, { category: "self", summary: "SUSE Bug 1200010", url: "https://bugzilla.suse.com/1200010", }, { category: "self", summary: "SUSE Bug 1200011", url: "https://bugzilla.suse.com/1200011", }, { category: "self", summary: "SUSE Bug 1200012", url: "https://bugzilla.suse.com/1200012", }, { category: "self", summary: "SUSE Bug 1200270", url: "https://bugzilla.suse.com/1200270", }, { category: "self", summary: "SUSE Bug 1200697", url: "https://bugzilla.suse.com/1200697", }, { category: "self", summary: "SUSE Bug 1200698", url: "https://bugzilla.suse.com/1200698", }, { category: "self", summary: "SUSE Bug 1200700", url: "https://bugzilla.suse.com/1200700", }, { category: "self", summary: "SUSE Bug 1200701", url: "https://bugzilla.suse.com/1200701", }, { category: "self", summary: "SUSE Bug 1200732", url: "https://bugzilla.suse.com/1200732", }, { category: "self", summary: "SUSE Bug 1200884", url: "https://bugzilla.suse.com/1200884", }, { category: "self", summary: "SUSE Bug 1200902", url: "https://bugzilla.suse.com/1200902", }, { category: "self", summary: "SUSE Bug 1200903", url: "https://bugzilla.suse.com/1200903", }, { category: "self", summary: "SUSE Bug 1200904", url: "https://bugzilla.suse.com/1200904", }, { category: "self", summary: "SUSE Bug 1201132", url: "https://bugzilla.suse.com/1201132", }, { category: "self", summary: "SUSE Bug 1201133", url: "https://bugzilla.suse.com/1201133", }, { category: "self", summary: "SUSE Bug 1201134", url: "https://bugzilla.suse.com/1201134", }, { category: "self", summary: "SUSE Bug 1201135", url: "https://bugzilla.suse.com/1201135", }, { category: "self", summary: "SUSE Bug 1201136", url: "https://bugzilla.suse.com/1201136", }, { category: "self", summary: "SUSE Bug 1201150", url: "https://bugzilla.suse.com/1201150", }, { category: "self", summary: "SUSE Bug 1201151", url: "https://bugzilla.suse.com/1201151", }, { category: "self", summary: "SUSE Bug 1201152", url: "https://bugzilla.suse.com/1201152", }, { category: "self", summary: "SUSE Bug 1201153", url: "https://bugzilla.suse.com/1201153", }, { category: "self", summary: "SUSE Bug 1201154", url: "https://bugzilla.suse.com/1201154", }, { category: "self", summary: "SUSE Bug 1201155", url: "https://bugzilla.suse.com/1201155", }, { category: "self", summary: "SUSE Bug 1201249", url: "https://bugzilla.suse.com/1201249", }, { category: "self", summary: "SUSE Bug 1201356", url: "https://bugzilla.suse.com/1201356", }, { category: "self", summary: "SUSE Bug 1201359", url: "https://bugzilla.suse.com/1201359", }, { category: "self", summary: "SUSE Bug 1201363", url: "https://bugzilla.suse.com/1201363", }, { category: "self", summary: "SUSE Bug 1201620", url: "https://bugzilla.suse.com/1201620", }, { category: "self", summary: "SUSE Bug 1201863", url: "https://bugzilla.suse.com/1201863", }, { category: "self", summary: "SUSE Bug 1202046", url: "https://bugzilla.suse.com/1202046", }, { category: "self", summary: "SUSE Bug 1202049", url: "https://bugzilla.suse.com/1202049", }, { category: "self", summary: "SUSE Bug 1202050", url: "https://bugzilla.suse.com/1202050", }, { category: "self", summary: "SUSE Bug 1202051", url: "https://bugzilla.suse.com/1202051", }, { category: "self", summary: "SUSE Bug 1202414", url: "https://bugzilla.suse.com/1202414", }, { category: "self", summary: "SUSE Bug 1202420", url: "https://bugzilla.suse.com/1202420", }, { category: "self", summary: "SUSE Bug 1202421", url: "https://bugzilla.suse.com/1202421", }, { category: "self", summary: "SUSE Bug 1202511", url: "https://bugzilla.suse.com/1202511", }, { category: "self", summary: "SUSE Bug 1202512", url: "https://bugzilla.suse.com/1202512", }, { category: "self", summary: "SUSE Bug 1202515", url: "https://bugzilla.suse.com/1202515", }, { category: "self", summary: "SUSE Bug 1202552", url: "https://bugzilla.suse.com/1202552", }, { category: "self", summary: "SUSE Bug 1202599", url: "https://bugzilla.suse.com/1202599", }, { category: "self", summary: "SUSE Bug 1202687", url: "https://bugzilla.suse.com/1202687", }, { category: "self", summary: "SUSE Bug 1202689", url: "https://bugzilla.suse.com/1202689", }, { category: "self", summary: "SUSE Bug 1202862", url: "https://bugzilla.suse.com/1202862", }, { category: "self", summary: "SUSE Bug 1202962", url: "https://bugzilla.suse.com/1202962", }, { category: "self", summary: "SUSE Bug 1203110", url: "https://bugzilla.suse.com/1203110", }, { category: "self", summary: "SUSE Bug 1203152", url: "https://bugzilla.suse.com/1203152", }, { category: "self", summary: "SUSE Bug 1203155", url: "https://bugzilla.suse.com/1203155", }, { category: "self", summary: "SUSE Bug 1203194", url: "https://bugzilla.suse.com/1203194", }, { category: "self", summary: "SUSE Bug 1203272", url: "https://bugzilla.suse.com/1203272", }, { category: "self", summary: "SUSE Bug 1203508", url: "https://bugzilla.suse.com/1203508", }, { category: "self", summary: "SUSE Bug 1203509", url: "https://bugzilla.suse.com/1203509", }, { category: "self", summary: "SUSE Bug 1203796", url: "https://bugzilla.suse.com/1203796", }, { category: "self", summary: "SUSE Bug 1203797", url: "https://bugzilla.suse.com/1203797", }, { category: "self", summary: "SUSE Bug 1203799", url: "https://bugzilla.suse.com/1203799", }, { category: "self", summary: "SUSE Bug 1203820", url: "https://bugzilla.suse.com/1203820", }, { category: "self", summary: "SUSE Bug 1203924", url: "https://bugzilla.suse.com/1203924", }, { category: "self", summary: "SUSE Bug 1204779", url: "https://bugzilla.suse.com/1204779", }, { category: "self", summary: "SUSE CVE CVE-2009-0316 page", url: "https://www.suse.com/security/cve/CVE-2009-0316/", }, { category: "self", summary: "SUSE CVE CVE-2016-1248 page", url: "https://www.suse.com/security/cve/CVE-2016-1248/", }, { category: "self", summary: "SUSE CVE CVE-2017-17087 page", url: "https://www.suse.com/security/cve/CVE-2017-17087/", }, { category: "self", summary: "SUSE CVE CVE-2017-5953 page", url: "https://www.suse.com/security/cve/CVE-2017-5953/", }, { category: "self", summary: "SUSE CVE CVE-2017-6349 page", url: "https://www.suse.com/security/cve/CVE-2017-6349/", }, { category: "self", summary: "SUSE CVE CVE-2017-6350 page", url: "https://www.suse.com/security/cve/CVE-2017-6350/", }, { category: "self", summary: "SUSE CVE CVE-2021-3778 page", url: "https://www.suse.com/security/cve/CVE-2021-3778/", }, { category: "self", summary: "SUSE CVE CVE-2021-3796 page", url: "https://www.suse.com/security/cve/CVE-2021-3796/", }, { category: "self", summary: "SUSE CVE CVE-2021-3872 page", url: "https://www.suse.com/security/cve/CVE-2021-3872/", }, { category: "self", summary: "SUSE CVE CVE-2021-3875 page", url: "https://www.suse.com/security/cve/CVE-2021-3875/", }, { category: "self", summary: "SUSE CVE CVE-2021-3903 page", url: "https://www.suse.com/security/cve/CVE-2021-3903/", }, { category: "self", summary: "SUSE CVE CVE-2021-3927 page", url: "https://www.suse.com/security/cve/CVE-2021-3927/", }, { category: "self", summary: "SUSE CVE CVE-2021-3928 page", url: "https://www.suse.com/security/cve/CVE-2021-3928/", }, { category: "self", summary: "SUSE CVE CVE-2021-3968 page", url: "https://www.suse.com/security/cve/CVE-2021-3968/", }, { category: "self", summary: "SUSE CVE CVE-2021-3973 page", url: "https://www.suse.com/security/cve/CVE-2021-3973/", }, { category: "self", summary: "SUSE CVE CVE-2021-3974 page", url: "https://www.suse.com/security/cve/CVE-2021-3974/", }, { category: "self", summary: "SUSE CVE CVE-2021-3984 page", url: "https://www.suse.com/security/cve/CVE-2021-3984/", }, { category: "self", summary: "SUSE CVE CVE-2021-4019 page", url: "https://www.suse.com/security/cve/CVE-2021-4019/", }, { category: "self", summary: "SUSE CVE CVE-2021-4069 page", url: "https://www.suse.com/security/cve/CVE-2021-4069/", }, { category: "self", summary: "SUSE CVE CVE-2021-4136 page", url: "https://www.suse.com/security/cve/CVE-2021-4136/", }, { category: "self", summary: "SUSE CVE CVE-2021-4166 page", url: "https://www.suse.com/security/cve/CVE-2021-4166/", }, { category: "self", summary: "SUSE CVE CVE-2021-4192 page", url: "https://www.suse.com/security/cve/CVE-2021-4192/", }, { category: "self", summary: "SUSE CVE CVE-2021-4193 page", url: "https://www.suse.com/security/cve/CVE-2021-4193/", }, { category: "self", summary: "SUSE CVE CVE-2021-46059 page", url: "https://www.suse.com/security/cve/CVE-2021-46059/", }, { category: "self", summary: "SUSE CVE CVE-2022-0128 page", url: "https://www.suse.com/security/cve/CVE-2022-0128/", }, { category: "self", summary: "SUSE CVE CVE-2022-0213 page", url: "https://www.suse.com/security/cve/CVE-2022-0213/", }, { category: "self", summary: "SUSE CVE CVE-2022-0261 page", url: "https://www.suse.com/security/cve/CVE-2022-0261/", }, { category: "self", summary: "SUSE CVE CVE-2022-0318 page", url: "https://www.suse.com/security/cve/CVE-2022-0318/", }, { category: "self", summary: "SUSE CVE CVE-2022-0319 page", url: "https://www.suse.com/security/cve/CVE-2022-0319/", }, { category: "self", summary: "SUSE CVE CVE-2022-0351 page", url: "https://www.suse.com/security/cve/CVE-2022-0351/", }, { category: "self", summary: "SUSE CVE CVE-2022-0359 page", url: "https://www.suse.com/security/cve/CVE-2022-0359/", }, { category: "self", summary: "SUSE CVE CVE-2022-0361 page", url: "https://www.suse.com/security/cve/CVE-2022-0361/", }, { category: "self", summary: "SUSE CVE CVE-2022-0392 page", url: "https://www.suse.com/security/cve/CVE-2022-0392/", }, { category: "self", summary: "SUSE CVE CVE-2022-0407 page", url: "https://www.suse.com/security/cve/CVE-2022-0407/", }, { category: "self", summary: "SUSE CVE CVE-2022-0413 page", url: "https://www.suse.com/security/cve/CVE-2022-0413/", }, { category: "self", summary: "SUSE CVE CVE-2022-0696 page", url: "https://www.suse.com/security/cve/CVE-2022-0696/", }, { category: "self", summary: "SUSE CVE CVE-2022-1381 page", url: "https://www.suse.com/security/cve/CVE-2022-1381/", }, { category: "self", summary: "SUSE CVE CVE-2022-1420 page", url: "https://www.suse.com/security/cve/CVE-2022-1420/", }, { category: "self", summary: "SUSE CVE CVE-2022-1616 page", url: "https://www.suse.com/security/cve/CVE-2022-1616/", }, { category: "self", summary: "SUSE CVE CVE-2022-1619 page", url: "https://www.suse.com/security/cve/CVE-2022-1619/", }, { category: "self", summary: "SUSE CVE CVE-2022-1620 page", url: "https://www.suse.com/security/cve/CVE-2022-1620/", }, { category: "self", summary: "SUSE CVE CVE-2022-1720 page", url: "https://www.suse.com/security/cve/CVE-2022-1720/", }, { category: "self", summary: "SUSE CVE CVE-2022-1733 page", url: "https://www.suse.com/security/cve/CVE-2022-1733/", }, { category: "self", summary: "SUSE CVE CVE-2022-1735 page", url: "https://www.suse.com/security/cve/CVE-2022-1735/", }, { category: "self", summary: "SUSE CVE CVE-2022-1771 page", url: "https://www.suse.com/security/cve/CVE-2022-1771/", }, { category: "self", summary: "SUSE CVE CVE-2022-1785 page", url: "https://www.suse.com/security/cve/CVE-2022-1785/", }, { category: "self", summary: "SUSE CVE CVE-2022-1796 page", url: "https://www.suse.com/security/cve/CVE-2022-1796/", }, { category: "self", summary: "SUSE CVE CVE-2022-1851 page", url: "https://www.suse.com/security/cve/CVE-2022-1851/", }, { category: "self", summary: "SUSE CVE CVE-2022-1897 page", url: "https://www.suse.com/security/cve/CVE-2022-1897/", }, { category: "self", summary: "SUSE CVE CVE-2022-1898 page", url: "https://www.suse.com/security/cve/CVE-2022-1898/", }, { category: "self", summary: "SUSE CVE CVE-2022-1927 page", url: "https://www.suse.com/security/cve/CVE-2022-1927/", }, { category: "self", summary: "SUSE CVE CVE-2022-1968 page", url: "https://www.suse.com/security/cve/CVE-2022-1968/", }, { category: "self", summary: "SUSE CVE CVE-2022-2124 page", url: "https://www.suse.com/security/cve/CVE-2022-2124/", }, { category: "self", summary: "SUSE CVE CVE-2022-2125 page", url: "https://www.suse.com/security/cve/CVE-2022-2125/", }, { category: "self", summary: "SUSE CVE CVE-2022-2126 page", url: "https://www.suse.com/security/cve/CVE-2022-2126/", }, { category: "self", summary: "SUSE CVE CVE-2022-2129 page", url: "https://www.suse.com/security/cve/CVE-2022-2129/", }, { category: "self", summary: "SUSE CVE CVE-2022-2175 page", url: "https://www.suse.com/security/cve/CVE-2022-2175/", }, { category: "self", summary: "SUSE CVE CVE-2022-2182 page", url: "https://www.suse.com/security/cve/CVE-2022-2182/", }, { category: "self", summary: "SUSE CVE CVE-2022-2183 page", url: "https://www.suse.com/security/cve/CVE-2022-2183/", }, { category: "self", summary: "SUSE CVE CVE-2022-2206 page", url: "https://www.suse.com/security/cve/CVE-2022-2206/", }, { category: "self", summary: "SUSE CVE CVE-2022-2207 page", url: "https://www.suse.com/security/cve/CVE-2022-2207/", }, { category: "self", summary: "SUSE CVE CVE-2022-2208 page", url: "https://www.suse.com/security/cve/CVE-2022-2208/", }, { category: "self", summary: "SUSE CVE CVE-2022-2210 page", url: "https://www.suse.com/security/cve/CVE-2022-2210/", }, { category: "self", summary: "SUSE CVE CVE-2022-2231 page", url: "https://www.suse.com/security/cve/CVE-2022-2231/", }, { category: "self", summary: "SUSE CVE CVE-2022-2257 page", url: "https://www.suse.com/security/cve/CVE-2022-2257/", }, { category: "self", summary: "SUSE CVE CVE-2022-2264 page", url: "https://www.suse.com/security/cve/CVE-2022-2264/", }, { category: "self", summary: "SUSE CVE CVE-2022-2284 page", url: "https://www.suse.com/security/cve/CVE-2022-2284/", }, { category: "self", summary: "SUSE CVE CVE-2022-2285 page", url: "https://www.suse.com/security/cve/CVE-2022-2285/", }, { category: "self", summary: "SUSE CVE CVE-2022-2286 page", url: "https://www.suse.com/security/cve/CVE-2022-2286/", }, { category: "self", summary: "SUSE CVE CVE-2022-2287 page", url: "https://www.suse.com/security/cve/CVE-2022-2287/", }, { category: "self", summary: "SUSE CVE CVE-2022-2304 page", url: "https://www.suse.com/security/cve/CVE-2022-2304/", }, { category: "self", summary: "SUSE CVE CVE-2022-2343 page", url: "https://www.suse.com/security/cve/CVE-2022-2343/", }, { category: "self", summary: "SUSE CVE CVE-2022-2344 page", url: "https://www.suse.com/security/cve/CVE-2022-2344/", }, { category: "self", summary: "SUSE CVE CVE-2022-2345 page", url: "https://www.suse.com/security/cve/CVE-2022-2345/", }, { category: "self", summary: "SUSE CVE CVE-2022-2522 page", url: "https://www.suse.com/security/cve/CVE-2022-2522/", }, { category: "self", summary: "SUSE CVE CVE-2022-2571 page", url: "https://www.suse.com/security/cve/CVE-2022-2571/", }, { category: "self", summary: "SUSE CVE CVE-2022-2580 page", url: "https://www.suse.com/security/cve/CVE-2022-2580/", }, { category: "self", summary: "SUSE CVE CVE-2022-2581 page", url: "https://www.suse.com/security/cve/CVE-2022-2581/", }, { category: "self", summary: "SUSE CVE CVE-2022-2598 page", url: "https://www.suse.com/security/cve/CVE-2022-2598/", }, { category: "self", summary: "SUSE CVE CVE-2022-2816 page", url: "https://www.suse.com/security/cve/CVE-2022-2816/", }, { category: "self", summary: "SUSE CVE CVE-2022-2817 page", url: "https://www.suse.com/security/cve/CVE-2022-2817/", }, { category: "self", summary: "SUSE CVE CVE-2022-2819 page", url: "https://www.suse.com/security/cve/CVE-2022-2819/", }, { category: "self", summary: "SUSE CVE CVE-2022-2845 page", url: "https://www.suse.com/security/cve/CVE-2022-2845/", }, { category: "self", summary: "SUSE CVE CVE-2022-2849 page", url: "https://www.suse.com/security/cve/CVE-2022-2849/", }, { category: "self", summary: "SUSE CVE CVE-2022-2862 page", url: "https://www.suse.com/security/cve/CVE-2022-2862/", }, { category: "self", summary: "SUSE CVE CVE-2022-2874 page", url: "https://www.suse.com/security/cve/CVE-2022-2874/", }, { category: "self", summary: "SUSE CVE CVE-2022-2889 page", url: "https://www.suse.com/security/cve/CVE-2022-2889/", }, { category: "self", summary: "SUSE CVE CVE-2022-2923 page", url: "https://www.suse.com/security/cve/CVE-2022-2923/", }, { category: "self", summary: "SUSE CVE CVE-2022-2946 page", url: "https://www.suse.com/security/cve/CVE-2022-2946/", }, { category: "self", summary: "SUSE CVE CVE-2022-2980 page", url: "https://www.suse.com/security/cve/CVE-2022-2980/", }, { category: "self", summary: "SUSE CVE CVE-2022-2982 page", url: "https://www.suse.com/security/cve/CVE-2022-2982/", }, { category: "self", summary: "SUSE CVE CVE-2022-3016 page", url: "https://www.suse.com/security/cve/CVE-2022-3016/", }, { category: "self", summary: "SUSE CVE CVE-2022-3037 page", url: "https://www.suse.com/security/cve/CVE-2022-3037/", }, { category: "self", summary: "SUSE CVE CVE-2022-3099 page", url: "https://www.suse.com/security/cve/CVE-2022-3099/", }, { category: "self", summary: "SUSE CVE CVE-2022-3134 page", url: "https://www.suse.com/security/cve/CVE-2022-3134/", }, { category: "self", summary: "SUSE CVE CVE-2022-3153 page", url: "https://www.suse.com/security/cve/CVE-2022-3153/", }, { category: "self", summary: "SUSE CVE CVE-2022-3234 page", url: "https://www.suse.com/security/cve/CVE-2022-3234/", }, { category: "self", summary: "SUSE CVE CVE-2022-3235 page", url: "https://www.suse.com/security/cve/CVE-2022-3235/", }, { category: "self", summary: "SUSE CVE CVE-2022-3278 page", url: "https://www.suse.com/security/cve/CVE-2022-3278/", }, { category: "self", summary: "SUSE CVE CVE-2022-3296 page", url: "https://www.suse.com/security/cve/CVE-2022-3296/", }, { category: "self", summary: "SUSE CVE CVE-2022-3297 page", url: "https://www.suse.com/security/cve/CVE-2022-3297/", }, { category: "self", summary: "SUSE CVE CVE-2022-3324 page", url: "https://www.suse.com/security/cve/CVE-2022-3324/", }, { category: "self", summary: "SUSE CVE CVE-2022-3352 page", url: "https://www.suse.com/security/cve/CVE-2022-3352/", }, { category: "self", summary: "SUSE CVE CVE-2022-3705 page", url: "https://www.suse.com/security/cve/CVE-2022-3705/", }, ], title: "Security update for vim", tracking: { current_release_date: "2022-12-27T04:16:45Z", generator: { date: "2022-12-27T04:16:45Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:4619-1", initial_release_date: "2022-12-27T04:16:45Z", revision_history: [ { date: "2022-12-27T04:16:45Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gvim-9.0.0814-17.9.1.aarch64", product: { name: "gvim-9.0.0814-17.9.1.aarch64", product_id: "gvim-9.0.0814-17.9.1.aarch64", }, }, { category: "product_version", name: "vim-9.0.0814-17.9.1.aarch64", product: { name: "vim-9.0.0814-17.9.1.aarch64", product_id: "vim-9.0.0814-17.9.1.aarch64", }, }, { category: "product_version", name: "vim-small-9.0.0814-17.9.1.aarch64", product: { name: "vim-small-9.0.0814-17.9.1.aarch64", product_id: "vim-small-9.0.0814-17.9.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gvim-9.0.0814-17.9.1.i586", product: { name: "gvim-9.0.0814-17.9.1.i586", product_id: "gvim-9.0.0814-17.9.1.i586", }, }, { category: "product_version", name: "vim-9.0.0814-17.9.1.i586", product: { name: "vim-9.0.0814-17.9.1.i586", product_id: "vim-9.0.0814-17.9.1.i586", }, }, { category: "product_version", name: "vim-small-9.0.0814-17.9.1.i586", product: { name: "vim-small-9.0.0814-17.9.1.i586", product_id: "vim-small-9.0.0814-17.9.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "vim-data-9.0.0814-17.9.1.noarch", product: { name: "vim-data-9.0.0814-17.9.1.noarch", product_id: "vim-data-9.0.0814-17.9.1.noarch", }, }, { category: "product_version", name: "vim-data-common-9.0.0814-17.9.1.noarch", product: { name: "vim-data-common-9.0.0814-17.9.1.noarch", product_id: "vim-data-common-9.0.0814-17.9.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "gvim-9.0.0814-17.9.1.ppc64le", product: { name: "gvim-9.0.0814-17.9.1.ppc64le", product_id: "gvim-9.0.0814-17.9.1.ppc64le", }, }, { category: "product_version", name: "vim-9.0.0814-17.9.1.ppc64le", product: { name: "vim-9.0.0814-17.9.1.ppc64le", product_id: "vim-9.0.0814-17.9.1.ppc64le", }, }, { category: "product_version", name: "vim-small-9.0.0814-17.9.1.ppc64le", product: { name: "vim-small-9.0.0814-17.9.1.ppc64le", product_id: "vim-small-9.0.0814-17.9.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gvim-9.0.0814-17.9.1.s390x", product: { name: "gvim-9.0.0814-17.9.1.s390x", product_id: "gvim-9.0.0814-17.9.1.s390x", }, }, { category: "product_version", name: "vim-9.0.0814-17.9.1.s390x", product: { name: "vim-9.0.0814-17.9.1.s390x", product_id: "vim-9.0.0814-17.9.1.s390x", }, }, { category: "product_version", name: "vim-small-9.0.0814-17.9.1.s390x", product: { name: "vim-small-9.0.0814-17.9.1.s390x", product_id: "vim-small-9.0.0814-17.9.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gvim-9.0.0814-17.9.1.x86_64", product: { name: "gvim-9.0.0814-17.9.1.x86_64", product_id: "gvim-9.0.0814-17.9.1.x86_64", }, }, { category: "product_version", name: "vim-9.0.0814-17.9.1.x86_64", product: { name: "vim-9.0.0814-17.9.1.x86_64", product_id: "vim-9.0.0814-17.9.1.x86_64", }, }, { category: "product_version", name: "vim-small-9.0.0814-17.9.1.x86_64", product: { name: "vim-small-9.0.0814-17.9.1.x86_64", product_id: "vim-small-9.0.0814-17.9.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 9", product: { name: "SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:9", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 9", product: { name: "SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:9", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", }, product_reference: "gvim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", }, product_reference: "vim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", }, product_reference: "gvim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", }, product_reference: "gvim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", }, product_reference: "gvim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", }, product_reference: "vim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", }, product_reference: "vim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", }, product_reference: "vim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", }, product_reference: "gvim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", }, product_reference: "gvim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", }, product_reference: "gvim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", }, product_reference: "vim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", }, product_reference: "vim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", }, product_reference: "vim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", }, product_reference: "gvim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", }, product_reference: "gvim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", }, product_reference: "gvim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", }, product_reference: "vim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", }, product_reference: "vim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", }, product_reference: "vim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2009-0316", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-0316", }, ], notes: [ { category: "general", text: "Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2009-0316", url: "https://www.suse.com/security/cve/CVE-2009-0316", }, { category: "external", summary: "SUSE Bug 470100 for CVE-2009-0316", url: "https://bugzilla.suse.com/470100", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2009-0316", }, { cve: "CVE-2016-1248", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1248", }, ], notes: [ { category: "general", text: "vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-1248", url: "https://www.suse.com/security/cve/CVE-2016-1248", }, { category: "external", summary: "SUSE Bug 1010685 for CVE-2016-1248", url: "https://bugzilla.suse.com/1010685", }, { category: "external", summary: "SUSE Bug 1173534 for CVE-2016-1248", url: "https://bugzilla.suse.com/1173534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2016-1248", }, { cve: "CVE-2017-17087", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17087", }, ], notes: [ { category: "general", text: "fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-17087", url: "https://www.suse.com/security/cve/CVE-2017-17087", }, { category: "external", summary: "SUSE Bug 1065958 for CVE-2017-17087", url: "https://bugzilla.suse.com/1065958", }, { category: "external", summary: "SUSE Bug 1070955 for CVE-2017-17087", url: "https://bugzilla.suse.com/1070955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2017-17087", }, { cve: "CVE-2017-5953", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5953", }, ], notes: [ { category: "general", text: "vim before patch 8.0.0322 does not properly validate values for tree length when handling a spell file, which may result in an integer overflow at a memory allocation site and a resultant buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-5953", url: "https://www.suse.com/security/cve/CVE-2017-5953", }, { category: "external", summary: "SUSE Bug 1024724 for CVE-2017-5953", url: "https://bugzilla.suse.com/1024724", }, { category: "external", summary: "SUSE Bug 1123143 for CVE-2017-5953", url: "https://bugzilla.suse.com/1123143", }, { category: "external", summary: "SUSE Bug 1173534 for CVE-2017-5953", url: "https://bugzilla.suse.com/1173534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2017-5953", }, { cve: "CVE-2017-6349", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6349", }, ], notes: [ { category: "general", text: "An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-6349", url: "https://www.suse.com/security/cve/CVE-2017-6349", }, { category: "external", summary: "SUSE Bug 1027057 for CVE-2017-6349", url: "https://bugzilla.suse.com/1027057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2017-6349", }, { cve: "CVE-2017-6350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6350", }, ], notes: [ { category: "general", text: "An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 8.0.0378, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-6350", url: "https://www.suse.com/security/cve/CVE-2017-6350", }, { category: "external", summary: "SUSE Bug 1027053 for CVE-2017-6350", url: "https://bugzilla.suse.com/1027053", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2017-6350", }, { cve: "CVE-2021-3778", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3778", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3778", url: "https://www.suse.com/security/cve/CVE-2021-3778", }, { category: "external", summary: "SUSE Bug 1190533 for CVE-2021-3778", url: "https://bugzilla.suse.com/1190533", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3796", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3796", url: "https://www.suse.com/security/cve/CVE-2021-3796", }, { category: "external", summary: "SUSE Bug 1190570 for CVE-2021-3796", url: "https://bugzilla.suse.com/1190570", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3796", }, { cve: "CVE-2021-3872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3872", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3872", url: "https://www.suse.com/security/cve/CVE-2021-3872", }, { category: "external", summary: "SUSE Bug 1191893 for CVE-2021-3872", url: "https://bugzilla.suse.com/1191893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3875", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3875", url: "https://www.suse.com/security/cve/CVE-2021-3875", }, { category: "external", summary: "SUSE Bug 1191770 for CVE-2021-3875", url: "https://bugzilla.suse.com/1191770", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3875", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3903", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3903", url: "https://www.suse.com/security/cve/CVE-2021-3903", }, { category: "external", summary: "SUSE Bug 1192167 for CVE-2021-3903", url: "https://bugzilla.suse.com/1192167", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3903", }, { cve: "CVE-2021-3927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3927", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3927", url: "https://www.suse.com/security/cve/CVE-2021-3927", }, { category: "external", summary: "SUSE Bug 1192481 for CVE-2021-3927", url: "https://bugzilla.suse.com/1192481", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3928", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use of Uninitialized Variable", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3928", url: "https://www.suse.com/security/cve/CVE-2021-3928", }, { category: "external", summary: "SUSE Bug 1192478 for CVE-2021-3928", url: "https://bugzilla.suse.com/1192478", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3968", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3968", url: "https://www.suse.com/security/cve/CVE-2021-3968", }, { category: "external", summary: "SUSE Bug 1192902 for CVE-2021-3968", url: "https://bugzilla.suse.com/1192902", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3973", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3973", url: "https://www.suse.com/security/cve/CVE-2021-3973", }, { category: "external", summary: "SUSE Bug 1192903 for CVE-2021-3973", url: "https://bugzilla.suse.com/1192903", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "critical", }, ], title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3974", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3974", url: "https://www.suse.com/security/cve/CVE-2021-3974", }, { category: "external", summary: "SUSE Bug 1192904 for CVE-2021-3974", url: "https://bugzilla.suse.com/1192904", }, { category: "external", summary: "SUSE Bug 1206818 for CVE-2021-3974", url: "https://bugzilla.suse.com/1206818", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3974", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3974", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3984", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3984", url: "https://www.suse.com/security/cve/CVE-2021-3984", }, { category: "external", summary: "SUSE Bug 1193298 for CVE-2021-3984", url: "https://bugzilla.suse.com/1193298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4019", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4019", url: "https://www.suse.com/security/cve/CVE-2021-4019", }, { category: "external", summary: "SUSE Bug 1193294 for CVE-2021-4019", url: "https://bugzilla.suse.com/1193294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-4019", }, { cve: "CVE-2021-4069", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4069", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4069", url: "https://www.suse.com/security/cve/CVE-2021-4069", }, { category: "external", summary: "SUSE Bug 1193466 for CVE-2021-4069", url: "https://bugzilla.suse.com/1193466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-4069", }, { cve: "CVE-2021-4136", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4136", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4136", url: "https://www.suse.com/security/cve/CVE-2021-4136", }, { category: "external", summary: "SUSE Bug 1193905 for CVE-2021-4136", url: "https://bugzilla.suse.com/1193905", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2021-4136", }, { cve: "CVE-2021-4166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4166", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4166", url: "https://www.suse.com/security/cve/CVE-2021-4166", }, { category: "external", summary: "SUSE Bug 1194093 for CVE-2021-4166", url: "https://bugzilla.suse.com/1194093", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-4166", }, { cve: "CVE-2021-4192", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4192", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4192", url: "https://www.suse.com/security/cve/CVE-2021-4192", }, { category: "external", summary: "SUSE Bug 1194217 for CVE-2021-4192", url: "https://bugzilla.suse.com/1194217", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4193", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4193", url: "https://www.suse.com/security/cve/CVE-2021-4193", }, { category: "external", summary: "SUSE Bug 1194216 for CVE-2021-4193", url: "https://bugzilla.suse.com/1194216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2021-4193", }, { cve: "CVE-2021-46059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-46059", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-46059", url: "https://www.suse.com/security/cve/CVE-2021-46059", }, { category: "external", summary: "SUSE Bug 1194556 for CVE-2021-46059", url: "https://bugzilla.suse.com/1194556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-46059", }, { cve: "CVE-2022-0128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0128", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0128", url: "https://www.suse.com/security/cve/CVE-2022-0128", }, { category: "external", summary: "SUSE Bug 1194388 for CVE-2022-0128", url: "https://bugzilla.suse.com/1194388", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-0128", }, { cve: "CVE-2022-0213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0213", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0213", url: "https://www.suse.com/security/cve/CVE-2022-0213", }, { category: "external", summary: "SUSE Bug 1194885 for CVE-2022-0213", url: "https://bugzilla.suse.com/1194885", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0213", }, { cve: "CVE-2022-0261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0261", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0261", url: "https://www.suse.com/security/cve/CVE-2022-0261", }, { category: "external", summary: "SUSE Bug 1194872 for CVE-2022-0261", url: "https://bugzilla.suse.com/1194872", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0318", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0318", url: "https://www.suse.com/security/cve/CVE-2022-0318", }, { category: "external", summary: "SUSE Bug 1195004 for CVE-2022-0318", url: "https://bugzilla.suse.com/1195004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0319", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0319", url: "https://www.suse.com/security/cve/CVE-2022-0319", }, { category: "external", summary: "SUSE Bug 1195066 for CVE-2022-0319", url: "https://bugzilla.suse.com/1195066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0351", }, ], notes: [ { category: "general", text: "Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0351", url: "https://www.suse.com/security/cve/CVE-2022-0351", }, { category: "external", summary: "SUSE Bug 1195126 for CVE-2022-0351", url: "https://bugzilla.suse.com/1195126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0359", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0359", url: "https://www.suse.com/security/cve/CVE-2022-0359", }, { category: "external", summary: "SUSE Bug 1195203 for CVE-2022-0359", url: "https://bugzilla.suse.com/1195203", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0361", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0361", url: "https://www.suse.com/security/cve/CVE-2022-0361", }, { category: "external", summary: "SUSE Bug 1195202 for CVE-2022-0361", url: "https://bugzilla.suse.com/1195202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0361", }, { cve: "CVE-2022-0392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0392", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0392", url: "https://www.suse.com/security/cve/CVE-2022-0392", }, { category: "external", summary: "SUSE Bug 1195332 for CVE-2022-0392", url: "https://bugzilla.suse.com/1195332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0407", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0407", url: "https://www.suse.com/security/cve/CVE-2022-0407", }, { category: "external", summary: "SUSE Bug 1195354 for CVE-2022-0407", url: "https://bugzilla.suse.com/1195354", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2022-0407", }, { cve: "CVE-2022-0413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0413", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0413", url: "https://www.suse.com/security/cve/CVE-2022-0413", }, { category: "external", summary: "SUSE Bug 1195356 for CVE-2022-0413", url: "https://bugzilla.suse.com/1195356", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2022-0413", }, { cve: "CVE-2022-0696", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0696", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0696", url: "https://www.suse.com/security/cve/CVE-2022-0696", }, { category: "external", summary: "SUSE Bug 1196361 for CVE-2022-0696", url: "https://bugzilla.suse.com/1196361", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-0696", url: "https://bugzilla.suse.com/1205395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-0696", }, { cve: "CVE-2022-1381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1381", }, ], notes: [ { category: "general", text: "global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1381", url: "https://www.suse.com/security/cve/CVE-2022-1381", }, { category: "external", summary: "SUSE Bug 1198596 for CVE-2022-1381", url: "https://bugzilla.suse.com/1198596", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1420", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1420", url: "https://www.suse.com/security/cve/CVE-2022-1420", }, { category: "external", summary: "SUSE Bug 1198748 for CVE-2022-1420", url: "https://bugzilla.suse.com/1198748", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1420", }, { cve: "CVE-2022-1616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1616", }, ], notes: [ { category: "general", text: "Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1616", url: "https://www.suse.com/security/cve/CVE-2022-1616", }, { category: "external", summary: "SUSE Bug 1199331 for CVE-2022-1616", url: "https://bugzilla.suse.com/1199331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1619", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1619", url: "https://www.suse.com/security/cve/CVE-2022-1619", }, { category: "external", summary: "SUSE Bug 1199333 for CVE-2022-1619", url: "https://bugzilla.suse.com/1199333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1620", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1620", url: "https://www.suse.com/security/cve/CVE-2022-1620", }, { category: "external", summary: "SUSE Bug 1199334 for CVE-2022-1620", url: "https://bugzilla.suse.com/1199334", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1620", }, { cve: "CVE-2022-1720", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1720", }, ], notes: [ { category: "general", text: "Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1720", url: "https://www.suse.com/security/cve/CVE-2022-1720", }, { category: "external", summary: "SUSE Bug 1200732 for CVE-2022-1720", url: "https://bugzilla.suse.com/1200732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1720", }, { cve: "CVE-2022-1733", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1733", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1733", url: "https://www.suse.com/security/cve/CVE-2022-1733", }, { category: "external", summary: "SUSE Bug 1199655 for CVE-2022-1733", url: "https://bugzilla.suse.com/1199655", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1735", }, ], notes: [ { category: "general", text: "Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1735", url: "https://www.suse.com/security/cve/CVE-2022-1735", }, { category: "external", summary: "SUSE Bug 1199651 for CVE-2022-1735", url: "https://bugzilla.suse.com/1199651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1735", }, { cve: "CVE-2022-1771", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1771", }, ], notes: [ { category: "general", text: "Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1771", url: "https://www.suse.com/security/cve/CVE-2022-1771", }, { category: "external", summary: "SUSE Bug 1199693 for CVE-2022-1771", url: "https://bugzilla.suse.com/1199693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1785", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1785", url: "https://www.suse.com/security/cve/CVE-2022-1785", }, { category: "external", summary: "SUSE Bug 1199745 for CVE-2022-1785", url: "https://bugzilla.suse.com/1199745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1796", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.4979.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1796", url: "https://www.suse.com/security/cve/CVE-2022-1796", }, { category: "external", summary: "SUSE Bug 1199747 for CVE-2022-1796", url: "https://bugzilla.suse.com/1199747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1851", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1851", url: "https://www.suse.com/security/cve/CVE-2022-1851", }, { category: "external", summary: "SUSE Bug 1199936 for CVE-2022-1851", url: "https://bugzilla.suse.com/1199936", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1897", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1897", url: "https://www.suse.com/security/cve/CVE-2022-1897", }, { category: "external", summary: "SUSE Bug 1200010 for CVE-2022-1897", url: "https://bugzilla.suse.com/1200010", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1898", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1898", url: "https://www.suse.com/security/cve/CVE-2022-1898", }, { category: "external", summary: "SUSE Bug 1200011 for CVE-2022-1898", url: "https://bugzilla.suse.com/1200011", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1927", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1927", url: "https://www.suse.com/security/cve/CVE-2022-1927", }, { category: "external", summary: "SUSE Bug 1200012 for CVE-2022-1927", url: "https://bugzilla.suse.com/1200012", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1927", }, { cve: "CVE-2022-1968", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1968", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1968", url: "https://www.suse.com/security/cve/CVE-2022-1968", }, { category: "external", summary: "SUSE Bug 1200270 for CVE-2022-1968", url: "https://bugzilla.suse.com/1200270", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1968", }, { cve: "CVE-2022-2124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2124", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2124", url: "https://www.suse.com/security/cve/CVE-2022-2124", }, { category: "external", summary: "SUSE Bug 1200697 for CVE-2022-2124", url: "https://bugzilla.suse.com/1200697", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2125", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2125", url: "https://www.suse.com/security/cve/CVE-2022-2125", }, { category: "external", summary: "SUSE Bug 1200698 for CVE-2022-2125", url: "https://bugzilla.suse.com/1200698", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-2125", url: "https://bugzilla.suse.com/1205395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2126", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2126", url: "https://www.suse.com/security/cve/CVE-2022-2126", }, { category: "external", summary: "SUSE Bug 1200700 for CVE-2022-2126", url: "https://bugzilla.suse.com/1200700", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2126", }, { cve: "CVE-2022-2129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2129", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2129", url: "https://www.suse.com/security/cve/CVE-2022-2129", }, { category: "external", summary: "SUSE Bug 1200701 for CVE-2022-2129", url: "https://bugzilla.suse.com/1200701", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2129", }, { cve: "CVE-2022-2175", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2175", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2175", url: "https://www.suse.com/security/cve/CVE-2022-2175", }, { category: "external", summary: "SUSE Bug 1200904 for CVE-2022-2175", url: "https://bugzilla.suse.com/1200904", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2175", }, { cve: "CVE-2022-2182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2182", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2182", url: "https://www.suse.com/security/cve/CVE-2022-2182", }, { category: "external", summary: "SUSE Bug 1200903 for CVE-2022-2182", url: "https://bugzilla.suse.com/1200903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2182", }, { cve: "CVE-2022-2183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2183", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2183", url: "https://www.suse.com/security/cve/CVE-2022-2183", }, { category: "external", summary: "SUSE Bug 1200902 for CVE-2022-2183", url: "https://bugzilla.suse.com/1200902", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2183", }, { cve: "CVE-2022-2206", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2206", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2206", url: "https://www.suse.com/security/cve/CVE-2022-2206", }, { category: "external", summary: "SUSE Bug 1201155 for CVE-2022-2206", url: "https://bugzilla.suse.com/1201155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2206", }, { cve: "CVE-2022-2207", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2207", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2207", url: "https://www.suse.com/security/cve/CVE-2022-2207", }, { category: "external", summary: "SUSE Bug 1201153 for CVE-2022-2207", url: "https://bugzilla.suse.com/1201153", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2207", }, { cve: "CVE-2022-2208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2208", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2208", url: "https://www.suse.com/security/cve/CVE-2022-2208", }, { category: "external", summary: "SUSE Bug 1201152 for CVE-2022-2208", url: "https://bugzilla.suse.com/1201152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2208", }, { cve: "CVE-2022-2210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2210", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2210", url: "https://www.suse.com/security/cve/CVE-2022-2210", }, { category: "external", summary: "SUSE Bug 1201151 for CVE-2022-2210", url: "https://bugzilla.suse.com/1201151", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2210", }, { cve: "CVE-2022-2231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2231", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2231", url: "https://www.suse.com/security/cve/CVE-2022-2231", }, { category: "external", summary: "SUSE Bug 1201150 for CVE-2022-2231", url: "https://bugzilla.suse.com/1201150", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2231", }, { cve: "CVE-2022-2257", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2257", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2257", url: "https://www.suse.com/security/cve/CVE-2022-2257", }, { category: "external", summary: "SUSE Bug 1201154 for CVE-2022-2257", url: "https://bugzilla.suse.com/1201154", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2257", }, { cve: "CVE-2022-2264", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2264", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2264", url: "https://www.suse.com/security/cve/CVE-2022-2264", }, { category: "external", summary: "SUSE Bug 1201132 for CVE-2022-2264", url: "https://bugzilla.suse.com/1201132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2264", }, { cve: "CVE-2022-2284", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2284", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2284", url: "https://www.suse.com/security/cve/CVE-2022-2284", }, { category: "external", summary: "SUSE Bug 1201133 for CVE-2022-2284", url: "https://bugzilla.suse.com/1201133", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2284", }, { cve: "CVE-2022-2285", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2285", }, ], notes: [ { category: "general", text: "Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2285", url: "https://www.suse.com/security/cve/CVE-2022-2285", }, { category: "external", summary: "SUSE Bug 1201134 for CVE-2022-2285", url: "https://bugzilla.suse.com/1201134", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2285", }, { cve: "CVE-2022-2286", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2286", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2286", url: "https://www.suse.com/security/cve/CVE-2022-2286", }, { category: "external", summary: "SUSE Bug 1201135 for CVE-2022-2286", url: "https://bugzilla.suse.com/1201135", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2286", }, { cve: "CVE-2022-2287", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2287", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2287", url: "https://www.suse.com/security/cve/CVE-2022-2287", }, { category: "external", summary: "SUSE Bug 1201136 for CVE-2022-2287", url: "https://bugzilla.suse.com/1201136", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2287", }, { cve: "CVE-2022-2304", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2304", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2304", url: "https://www.suse.com/security/cve/CVE-2022-2304", }, { category: "external", summary: "SUSE Bug 1201249 for CVE-2022-2304", url: "https://bugzilla.suse.com/1201249", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2304", }, { cve: "CVE-2022-2343", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2343", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2343", url: "https://www.suse.com/security/cve/CVE-2022-2343", }, { category: "external", summary: "SUSE Bug 1201356 for CVE-2022-2343", url: "https://bugzilla.suse.com/1201356", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2343", }, { cve: "CVE-2022-2344", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2344", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2344", url: "https://www.suse.com/security/cve/CVE-2022-2344", }, { category: "external", summary: "SUSE Bug 1201359 for CVE-2022-2344", url: "https://bugzilla.suse.com/1201359", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2344", }, { cve: "CVE-2022-2345", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2345", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0046.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2345", url: "https://www.suse.com/security/cve/CVE-2022-2345", }, { category: "external", summary: "SUSE Bug 1201363 for CVE-2022-2345", url: "https://bugzilla.suse.com/1201363", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2345", }, { cve: "CVE-2022-2522", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2522", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2522", url: "https://www.suse.com/security/cve/CVE-2022-2522", }, { category: "external", summary: "SUSE Bug 1201863 for CVE-2022-2522", url: "https://bugzilla.suse.com/1201863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2522", }, { cve: "CVE-2022-2571", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2571", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2571", url: "https://www.suse.com/security/cve/CVE-2022-2571", }, { category: "external", summary: "SUSE Bug 1202046 for CVE-2022-2571", url: "https://bugzilla.suse.com/1202046", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2571", }, { cve: "CVE-2022-2580", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2580", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2580", url: "https://www.suse.com/security/cve/CVE-2022-2580", }, { category: "external", summary: "SUSE Bug 1202049 for CVE-2022-2580", url: "https://bugzilla.suse.com/1202049", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2580", }, { cve: "CVE-2022-2581", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2581", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2581", url: "https://www.suse.com/security/cve/CVE-2022-2581", }, { category: "external", summary: "SUSE Bug 1202050 for CVE-2022-2581", url: "https://bugzilla.suse.com/1202050", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2581", }, { cve: "CVE-2022-2598", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2598", }, ], notes: [ { category: "general", text: "Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2598", url: "https://www.suse.com/security/cve/CVE-2022-2598", }, { category: "external", summary: "SUSE Bug 1202051 for CVE-2022-2598", url: "https://bugzilla.suse.com/1202051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2598", }, { cve: "CVE-2022-2816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2816", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2816", url: "https://www.suse.com/security/cve/CVE-2022-2816", }, { category: "external", summary: "SUSE Bug 1202421 for CVE-2022-2816", url: "https://bugzilla.suse.com/1202421", }, { category: "external", summary: "SUSE Bug 1203576 for CVE-2022-2816", url: "https://bugzilla.suse.com/1203576", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2816", }, { cve: "CVE-2022-2817", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2817", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0213.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2817", url: "https://www.suse.com/security/cve/CVE-2022-2817", }, { category: "external", summary: "SUSE Bug 1202420 for CVE-2022-2817", url: "https://bugzilla.suse.com/1202420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2817", }, { cve: "CVE-2022-2819", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2819", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2819", url: "https://www.suse.com/security/cve/CVE-2022-2819", }, { category: "external", summary: "SUSE Bug 1202414 for CVE-2022-2819", url: "https://bugzilla.suse.com/1202414", }, { category: "external", summary: "SUSE Bug 1203576 for CVE-2022-2819", url: "https://bugzilla.suse.com/1203576", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2819", }, { cve: "CVE-2022-2845", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2845", }, ], notes: [ { category: "general", text: "Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2845", url: "https://www.suse.com/security/cve/CVE-2022-2845", }, { category: "external", summary: "SUSE Bug 1202515 for CVE-2022-2845", url: "https://bugzilla.suse.com/1202515", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2845", }, { cve: "CVE-2022-2849", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2849", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2849", url: "https://www.suse.com/security/cve/CVE-2022-2849", }, { category: "external", summary: "SUSE Bug 1202512 for CVE-2022-2849", url: "https://bugzilla.suse.com/1202512", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2849", }, { cve: "CVE-2022-2862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2862", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0221.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2862", url: "https://www.suse.com/security/cve/CVE-2022-2862", }, { category: "external", summary: "SUSE Bug 1202511 for CVE-2022-2862", url: "https://bugzilla.suse.com/1202511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2862", }, { cve: "CVE-2022-2874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2874", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2874", url: "https://www.suse.com/security/cve/CVE-2022-2874", }, { category: "external", summary: "SUSE Bug 1202552 for CVE-2022-2874", url: "https://bugzilla.suse.com/1202552", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2874", }, { cve: "CVE-2022-2889", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2889", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0225.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2889", url: "https://www.suse.com/security/cve/CVE-2022-2889", }, { category: "external", summary: "SUSE Bug 1202599 for CVE-2022-2889", url: "https://bugzilla.suse.com/1202599", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2889", }, { cve: "CVE-2022-2923", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2923", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2923", url: "https://www.suse.com/security/cve/CVE-2022-2923", }, { category: "external", summary: "SUSE Bug 1202687 for CVE-2022-2923", url: "https://bugzilla.suse.com/1202687", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2923", }, { cve: "CVE-2022-2946", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2946", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0246.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2946", url: "https://www.suse.com/security/cve/CVE-2022-2946", }, { category: "external", summary: "SUSE Bug 1202689 for CVE-2022-2946", url: "https://bugzilla.suse.com/1202689", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2946", }, { cve: "CVE-2022-2980", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2980", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2980", url: "https://www.suse.com/security/cve/CVE-2022-2980", }, { category: "external", summary: "SUSE Bug 1203155 for CVE-2022-2980", url: "https://bugzilla.suse.com/1203155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2980", }, { cve: "CVE-2022-2982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2982", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0260.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2982", url: "https://www.suse.com/security/cve/CVE-2022-2982", }, { category: "external", summary: "SUSE Bug 1203152 for CVE-2022-2982", url: "https://bugzilla.suse.com/1203152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2982", }, { cve: "CVE-2022-3016", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3016", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0286.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3016", url: "https://www.suse.com/security/cve/CVE-2022-3016", }, { category: "external", summary: "SUSE Bug 1202862 for CVE-2022-3016", url: "https://bugzilla.suse.com/1202862", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-3016", }, { cve: "CVE-2022-3037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3037", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0322.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3037", url: "https://www.suse.com/security/cve/CVE-2022-3037", }, { category: "external", summary: "SUSE Bug 1202962 for CVE-2022-3037", url: "https://bugzilla.suse.com/1202962", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-3037", }, { cve: "CVE-2022-3099", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3099", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0360.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3099", url: "https://www.suse.com/security/cve/CVE-2022-3099", }, { category: "external", summary: "SUSE Bug 1203110 for CVE-2022-3099", url: "https://bugzilla.suse.com/1203110", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3099", }, { cve: "CVE-2022-3134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3134", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0389.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3134", url: "https://www.suse.com/security/cve/CVE-2022-3134", }, { category: "external", summary: "SUSE Bug 1203194 for CVE-2022-3134", url: "https://bugzilla.suse.com/1203194", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-3134", }, { cve: "CVE-2022-3153", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3153", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3153", url: "https://www.suse.com/security/cve/CVE-2022-3153", }, { category: "external", summary: "SUSE Bug 1203272 for CVE-2022-3153", url: "https://bugzilla.suse.com/1203272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3153", }, { cve: "CVE-2022-3234", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3234", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3234", url: "https://www.suse.com/security/cve/CVE-2022-3234", }, { category: "external", summary: "SUSE Bug 1203508 for CVE-2022-3234", url: "https://bugzilla.suse.com/1203508", }, { category: "external", summary: "SUSE Bug 1206240 for CVE-2022-3234", url: "https://bugzilla.suse.com/1206240", }, { category: "external", summary: "SUSE Bug 1208002 for CVE-2022-3234", url: "https://bugzilla.suse.com/1208002", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-3234", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-3234", url: "https://bugzilla.suse.com/1208651", }, { category: "external", summary: "SUSE Bug 1209329 for CVE-2022-3234", url: "https://bugzilla.suse.com/1209329", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2022-3234", }, { cve: "CVE-2022-3235", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3235", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0490.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3235", url: "https://www.suse.com/security/cve/CVE-2022-3235", }, { category: "external", summary: "SUSE Bug 1203509 for CVE-2022-3235", url: "https://bugzilla.suse.com/1203509", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-3235", }, { cve: "CVE-2022-3278", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3278", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0552.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3278", url: "https://www.suse.com/security/cve/CVE-2022-3278", }, { category: "external", summary: "SUSE Bug 1203799 for CVE-2022-3278", url: "https://bugzilla.suse.com/1203799", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-3278", }, { cve: "CVE-2022-3296", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3296", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3296", url: "https://www.suse.com/security/cve/CVE-2022-3296", }, { category: "external", summary: "SUSE Bug 1203796 for CVE-2022-3296", url: "https://bugzilla.suse.com/1203796", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-3296", url: "https://bugzilla.suse.com/1205395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3296", }, { cve: "CVE-2022-3297", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3297", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0579.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3297", url: "https://www.suse.com/security/cve/CVE-2022-3297", }, { category: "external", summary: "SUSE Bug 1203797 for CVE-2022-3297", url: "https://bugzilla.suse.com/1203797", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3297", }, { cve: "CVE-2022-3324", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3324", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3324", url: "https://www.suse.com/security/cve/CVE-2022-3324", }, { category: "external", summary: "SUSE Bug 1203820 for CVE-2022-3324", url: "https://bugzilla.suse.com/1203820", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-3324", url: "https://bugzilla.suse.com/1205395", }, { category: "external", summary: "SUSE Bug 1206240 for CVE-2022-3324", url: "https://bugzilla.suse.com/1206240", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3324", }, { cve: "CVE-2022-3352", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3352", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0614.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3352", url: "https://www.suse.com/security/cve/CVE-2022-3352", }, { category: "external", summary: "SUSE Bug 1203924 for CVE-2022-3352", url: "https://bugzilla.suse.com/1203924", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3352", }, { cve: "CVE-2022-3705", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3705", }, ], notes: [ { category: "general", text: "A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3705", url: "https://www.suse.com/security/cve/CVE-2022-3705", }, { category: "external", summary: "SUSE Bug 1204779 for CVE-2022-3705", url: "https://bugzilla.suse.com/1204779", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3705", }, ], }
suse-su-2022:2102-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for vim", title: "Title of the patch", }, { category: "description", text: "This update for vim fixes the following issues:\n\n- CVE-2017-17087: Fixed information leak via .swp files (bsc#1070955).\n- CVE-2021-3875: Fixed heap-based buffer overflow (bsc#1191770).\n- CVE-2021-3903: Fixed heap-based buffer overflow (bsc#1192167).\n- CVE-2021-3968: Fixed heap-based buffer overflow (bsc#1192902).\n- CVE-2021-3973: Fixed heap-based buffer overflow (bsc#1192903).\n- CVE-2021-3974: Fixed use-after-free (bsc#1192904).\n- CVE-2021-4069: Fixed use-after-free in ex_open()in src/ex_docmd.c (bsc#1193466).\n- CVE-2021-4136: Fixed heap-based buffer overflow (bsc#1193905).\n- CVE-2021-4166: Fixed out-of-bounds read (bsc#1194093).\n- CVE-2021-4192: Fixed use-after-free (bsc#1194217).\n- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).\n- CVE-2022-0128: Fixed out-of-bounds read (bsc#1194388).\n- CVE-2022-0213: Fixed heap-based buffer overflow (bsc#1194885).\n- CVE-2022-0261: Fixed heap-based buffer overflow (bsc#1194872).\n- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).\n- CVE-2022-0359: Fixed heap-based buffer overflow in init_ccline() in ex_getln.c (bsc#1195203).\n- CVE-2022-0392: Fixed heap-based buffer overflow (bsc#1195332).\n- CVE-2022-0407: Fixed heap-based buffer overflow (bsc#1195354).\n- CVE-2022-0696: Fixed NULL pointer dereference (bsc#1196361).\n- CVE-2022-1381: Fixed global heap buffer overflow in skip_range (bsc#1198596).\n- CVE-2022-1420: Fixed out-of-range pointer offset (bsc#1198748).\n- CVE-2022-1616: Fixed use-after-free in append_command (bsc#1199331).\n- CVE-2022-1619: Fixed heap-based Buffer Overflow in function cmdline_erase_chars (bsc#1199333).\n- CVE-2022-1620: Fixed NULL pointer dereference in function vim_regexec_string (bsc#1199334).\n- CVE-2022-1733: Fixed heap-based buffer overflow in cindent.c (bsc#1199655).\n- CVE-2022-1735: Fixed heap-based buffer overflow (bsc#1199651).\n- CVE-2022-1771: Fixed stack exhaustion (bsc#1199693).\n- CVE-2022-1785: Fixed out-of-bounds write (bsc#1199745).\n- CVE-2022-1796: Fixed use-after-free in find_pattern_in_path (bsc#1199747).\n- CVE-2022-1851: Fixed out-of-bounds read (bsc#1199936).\n- CVE-2022-1897: Fixed out-of-bounds write (bsc#1200010).\n- CVE-2022-1898: Fixed use-after-free (bsc#1200011).\n- CVE-2022-1927: Fixed buffer over-read (bsc#1200012).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-2102,SUSE-SLE-Module-Basesystem-15-SP3-2022-2102,SUSE-SLE-Module-Basesystem-15-SP4-2022-2102,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-2102,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2102,SUSE-SLE-Product-HPC-15-2022-2102,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2102,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2102,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2102,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2102,SUSE-SLE-Product-SLES-15-2022-2102,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2102,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2102,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2102,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2102,SUSE-SLE-Product-SLES_SAP-15-2022-2102,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2102,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2102,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2102,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2102,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2102,SUSE-SUSE-MicroOS-5.1-2022-2102,SUSE-SUSE-MicroOS-5.2-2022-2102,SUSE-Storage-6-2022-2102,SUSE-Storage-7-2022-2102,openSUSE-SLE-15.3-2022-2102,openSUSE-SLE-15.4-2022-2102", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2102-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:2102-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20222102-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:2102-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html", }, { category: "self", summary: "SUSE Bug 1070955", url: "https://bugzilla.suse.com/1070955", }, { category: "self", summary: "SUSE Bug 1191770", url: "https://bugzilla.suse.com/1191770", }, { category: "self", summary: "SUSE Bug 1192167", url: "https://bugzilla.suse.com/1192167", }, { category: "self", summary: "SUSE Bug 1192902", url: "https://bugzilla.suse.com/1192902", }, { category: "self", summary: "SUSE Bug 1192903", url: "https://bugzilla.suse.com/1192903", }, { category: "self", summary: "SUSE Bug 1192904", url: "https://bugzilla.suse.com/1192904", }, { category: "self", summary: "SUSE Bug 1193466", url: "https://bugzilla.suse.com/1193466", }, { category: "self", summary: "SUSE Bug 1193905", url: "https://bugzilla.suse.com/1193905", }, { category: "self", summary: "SUSE Bug 1194093", url: "https://bugzilla.suse.com/1194093", }, { category: "self", summary: "SUSE Bug 1194216", url: "https://bugzilla.suse.com/1194216", }, { category: "self", summary: "SUSE Bug 1194217", url: "https://bugzilla.suse.com/1194217", }, { category: "self", summary: "SUSE Bug 1194388", url: "https://bugzilla.suse.com/1194388", }, { category: "self", summary: "SUSE Bug 1194872", url: "https://bugzilla.suse.com/1194872", }, { category: "self", summary: "SUSE Bug 1194885", url: "https://bugzilla.suse.com/1194885", }, { category: "self", summary: "SUSE Bug 1195004", url: "https://bugzilla.suse.com/1195004", }, { category: "self", summary: "SUSE Bug 1195203", url: "https://bugzilla.suse.com/1195203", }, { category: "self", summary: "SUSE Bug 1195332", url: "https://bugzilla.suse.com/1195332", }, { category: "self", summary: "SUSE Bug 1195354", url: "https://bugzilla.suse.com/1195354", }, { category: "self", summary: "SUSE Bug 1196361", url: "https://bugzilla.suse.com/1196361", }, { category: "self", summary: "SUSE Bug 1198596", url: "https://bugzilla.suse.com/1198596", }, { category: "self", summary: "SUSE Bug 1198748", url: "https://bugzilla.suse.com/1198748", }, { category: "self", summary: "SUSE Bug 1199331", url: "https://bugzilla.suse.com/1199331", }, { category: "self", summary: "SUSE Bug 1199333", url: "https://bugzilla.suse.com/1199333", }, { category: "self", summary: "SUSE Bug 1199334", url: "https://bugzilla.suse.com/1199334", }, { category: "self", summary: "SUSE Bug 1199651", url: "https://bugzilla.suse.com/1199651", }, { category: "self", summary: "SUSE Bug 1199655", url: "https://bugzilla.suse.com/1199655", }, { category: "self", summary: "SUSE Bug 1199693", url: "https://bugzilla.suse.com/1199693", }, { category: "self", summary: "SUSE Bug 1199745", url: "https://bugzilla.suse.com/1199745", }, { category: "self", summary: "SUSE Bug 1199747", url: "https://bugzilla.suse.com/1199747", }, { category: "self", summary: "SUSE Bug 1199936", url: "https://bugzilla.suse.com/1199936", }, { category: "self", summary: "SUSE Bug 1200010", url: "https://bugzilla.suse.com/1200010", }, { category: "self", summary: "SUSE Bug 1200011", url: "https://bugzilla.suse.com/1200011", }, { category: "self", summary: "SUSE Bug 1200012", url: "https://bugzilla.suse.com/1200012", }, { category: "self", summary: "SUSE CVE CVE-2017-17087 page", url: "https://www.suse.com/security/cve/CVE-2017-17087/", }, { category: "self", summary: "SUSE CVE CVE-2021-3778 page", url: "https://www.suse.com/security/cve/CVE-2021-3778/", }, { category: "self", summary: "SUSE CVE CVE-2021-3796 page", url: "https://www.suse.com/security/cve/CVE-2021-3796/", }, { category: "self", summary: "SUSE CVE CVE-2021-3872 page", url: "https://www.suse.com/security/cve/CVE-2021-3872/", }, { category: "self", summary: "SUSE CVE CVE-2021-3875 page", url: "https://www.suse.com/security/cve/CVE-2021-3875/", }, { category: "self", summary: "SUSE CVE CVE-2021-3903 page", url: "https://www.suse.com/security/cve/CVE-2021-3903/", }, { category: "self", summary: "SUSE CVE CVE-2021-3927 page", url: "https://www.suse.com/security/cve/CVE-2021-3927/", }, { category: "self", summary: "SUSE CVE CVE-2021-3928 page", url: "https://www.suse.com/security/cve/CVE-2021-3928/", }, { category: "self", summary: "SUSE CVE CVE-2021-3968 page", url: "https://www.suse.com/security/cve/CVE-2021-3968/", }, { category: "self", summary: "SUSE CVE CVE-2021-3973 page", url: "https://www.suse.com/security/cve/CVE-2021-3973/", }, { category: "self", summary: "SUSE CVE CVE-2021-3974 page", url: "https://www.suse.com/security/cve/CVE-2021-3974/", }, { category: "self", summary: "SUSE CVE CVE-2021-3984 page", url: "https://www.suse.com/security/cve/CVE-2021-3984/", }, { category: "self", summary: "SUSE CVE CVE-2021-4019 page", url: "https://www.suse.com/security/cve/CVE-2021-4019/", }, { category: "self", summary: "SUSE CVE CVE-2021-4069 page", url: "https://www.suse.com/security/cve/CVE-2021-4069/", }, { category: "self", summary: "SUSE CVE CVE-2021-4136 page", url: "https://www.suse.com/security/cve/CVE-2021-4136/", }, { category: "self", summary: "SUSE CVE CVE-2021-4166 page", url: "https://www.suse.com/security/cve/CVE-2021-4166/", }, { category: "self", summary: "SUSE CVE CVE-2021-4192 page", url: "https://www.suse.com/security/cve/CVE-2021-4192/", }, { category: "self", summary: "SUSE CVE CVE-2021-4193 page", url: "https://www.suse.com/security/cve/CVE-2021-4193/", }, { category: "self", summary: "SUSE CVE CVE-2021-46059 page", url: "https://www.suse.com/security/cve/CVE-2021-46059/", }, { category: "self", summary: "SUSE CVE CVE-2022-0128 page", url: "https://www.suse.com/security/cve/CVE-2022-0128/", }, { category: "self", summary: "SUSE CVE CVE-2022-0213 page", url: "https://www.suse.com/security/cve/CVE-2022-0213/", }, { category: "self", summary: "SUSE CVE CVE-2022-0261 page", url: "https://www.suse.com/security/cve/CVE-2022-0261/", }, { category: "self", summary: "SUSE CVE CVE-2022-0318 page", url: "https://www.suse.com/security/cve/CVE-2022-0318/", }, { category: "self", summary: "SUSE CVE CVE-2022-0319 page", url: "https://www.suse.com/security/cve/CVE-2022-0319/", }, { category: "self", summary: "SUSE CVE CVE-2022-0351 page", url: "https://www.suse.com/security/cve/CVE-2022-0351/", }, { category: "self", summary: "SUSE CVE CVE-2022-0359 page", url: "https://www.suse.com/security/cve/CVE-2022-0359/", }, { category: "self", summary: "SUSE CVE CVE-2022-0361 page", url: "https://www.suse.com/security/cve/CVE-2022-0361/", }, { category: "self", summary: "SUSE CVE CVE-2022-0392 page", url: "https://www.suse.com/security/cve/CVE-2022-0392/", }, { category: "self", summary: "SUSE CVE CVE-2022-0407 page", url: "https://www.suse.com/security/cve/CVE-2022-0407/", }, { category: "self", summary: "SUSE CVE CVE-2022-0413 page", url: "https://www.suse.com/security/cve/CVE-2022-0413/", }, { category: "self", summary: "SUSE CVE CVE-2022-0696 page", url: "https://www.suse.com/security/cve/CVE-2022-0696/", }, { category: "self", summary: "SUSE CVE CVE-2022-1381 page", url: "https://www.suse.com/security/cve/CVE-2022-1381/", }, { category: "self", summary: "SUSE CVE CVE-2022-1420 page", url: "https://www.suse.com/security/cve/CVE-2022-1420/", }, { category: "self", summary: "SUSE CVE CVE-2022-1616 page", url: "https://www.suse.com/security/cve/CVE-2022-1616/", }, { category: "self", summary: "SUSE CVE CVE-2022-1619 page", url: "https://www.suse.com/security/cve/CVE-2022-1619/", }, { category: "self", summary: "SUSE CVE CVE-2022-1620 page", url: "https://www.suse.com/security/cve/CVE-2022-1620/", }, { category: "self", summary: "SUSE CVE CVE-2022-1733 page", url: "https://www.suse.com/security/cve/CVE-2022-1733/", }, { category: "self", summary: "SUSE CVE CVE-2022-1735 page", url: "https://www.suse.com/security/cve/CVE-2022-1735/", }, { category: "self", summary: "SUSE CVE CVE-2022-1771 page", url: "https://www.suse.com/security/cve/CVE-2022-1771/", }, { category: "self", summary: "SUSE CVE CVE-2022-1785 page", url: "https://www.suse.com/security/cve/CVE-2022-1785/", }, { category: "self", summary: "SUSE CVE CVE-2022-1796 page", url: "https://www.suse.com/security/cve/CVE-2022-1796/", }, { category: "self", summary: "SUSE CVE CVE-2022-1851 page", url: "https://www.suse.com/security/cve/CVE-2022-1851/", }, { category: "self", summary: "SUSE CVE CVE-2022-1897 page", url: "https://www.suse.com/security/cve/CVE-2022-1897/", }, { category: "self", summary: "SUSE CVE CVE-2022-1898 page", url: "https://www.suse.com/security/cve/CVE-2022-1898/", }, { category: "self", summary: "SUSE CVE CVE-2022-1927 page", url: "https://www.suse.com/security/cve/CVE-2022-1927/", }, ], title: "Security update for vim", tracking: { current_release_date: "2022-06-16T13:18:54Z", generator: { date: "2022-06-16T13:18:54Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:2102-1", initial_release_date: "2022-06-16T13:18:54Z", revision_history: [ { date: "2022-06-16T13:18:54Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gvim-8.2.5038-150000.5.21.1.aarch64", product: { name: "gvim-8.2.5038-150000.5.21.1.aarch64", product_id: "gvim-8.2.5038-150000.5.21.1.aarch64", }, }, { category: "product_version", name: "vim-8.2.5038-150000.5.21.1.aarch64", product: { name: "vim-8.2.5038-150000.5.21.1.aarch64", product_id: "vim-8.2.5038-150000.5.21.1.aarch64", }, }, { category: "product_version", name: "vim-small-8.2.5038-150000.5.21.1.aarch64", product: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64", product_id: "vim-small-8.2.5038-150000.5.21.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gvim-8.2.5038-150000.5.21.1.i586", product: { name: "gvim-8.2.5038-150000.5.21.1.i586", product_id: "gvim-8.2.5038-150000.5.21.1.i586", }, }, { category: "product_version", name: "vim-8.2.5038-150000.5.21.1.i586", product: { name: "vim-8.2.5038-150000.5.21.1.i586", product_id: "vim-8.2.5038-150000.5.21.1.i586", }, }, { category: "product_version", name: "vim-small-8.2.5038-150000.5.21.1.i586", product: { name: "vim-small-8.2.5038-150000.5.21.1.i586", product_id: "vim-small-8.2.5038-150000.5.21.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "vim-data-8.2.5038-150000.5.21.1.noarch", product: { name: "vim-data-8.2.5038-150000.5.21.1.noarch", product_id: "vim-data-8.2.5038-150000.5.21.1.noarch", }, }, { category: "product_version", name: "vim-data-common-8.2.5038-150000.5.21.1.noarch", product: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch", product_id: "vim-data-common-8.2.5038-150000.5.21.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "gvim-8.2.5038-150000.5.21.1.ppc64le", product: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le", product_id: "gvim-8.2.5038-150000.5.21.1.ppc64le", }, }, { category: "product_version", name: "vim-8.2.5038-150000.5.21.1.ppc64le", product: { name: "vim-8.2.5038-150000.5.21.1.ppc64le", product_id: "vim-8.2.5038-150000.5.21.1.ppc64le", }, }, { category: "product_version", name: "vim-small-8.2.5038-150000.5.21.1.ppc64le", product: { name: "vim-small-8.2.5038-150000.5.21.1.ppc64le", product_id: "vim-small-8.2.5038-150000.5.21.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gvim-8.2.5038-150000.5.21.1.s390x", product: { name: "gvim-8.2.5038-150000.5.21.1.s390x", product_id: "gvim-8.2.5038-150000.5.21.1.s390x", }, }, { category: "product_version", name: "vim-8.2.5038-150000.5.21.1.s390x", product: { name: "vim-8.2.5038-150000.5.21.1.s390x", product_id: "vim-8.2.5038-150000.5.21.1.s390x", }, }, { category: "product_version", name: "vim-small-8.2.5038-150000.5.21.1.s390x", product: { name: "vim-small-8.2.5038-150000.5.21.1.s390x", product_id: "vim-small-8.2.5038-150000.5.21.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gvim-8.2.5038-150000.5.21.1.x86_64", product: { name: "gvim-8.2.5038-150000.5.21.1.x86_64", product_id: "gvim-8.2.5038-150000.5.21.1.x86_64", }, }, { category: "product_version", name: "vim-8.2.5038-150000.5.21.1.x86_64", product: { name: "vim-8.2.5038-150000.5.21.1.x86_64", product_id: "vim-8.2.5038-150000.5.21.1.x86_64", }, }, { category: "product_version", name: "vim-small-8.2.5038-150000.5.21.1.x86_64", product: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64", product_id: "vim-small-8.2.5038-150000.5.21.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product: { name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-desktop-applications:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product: { name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-desktop-applications:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15-LTSS", product: { name: "SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp2", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.1", product: { name: "SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Retail Branch Server 4.1", product: { name: "SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-retail-branch-server:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.1", product: { name: "SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.1", product: { name: "SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.2", product: { name: "SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.2", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 6", product: { name: "SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6", product_identification_helper: { cpe: "cpe:/o:suse:ses:6", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7", product: { name: "SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7", product_identification_helper: { cpe: "cpe:/o:suse:ses:7", }, }, }, { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2017-17087", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17087", }, ], notes: [ { category: "general", text: "fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17087", url: "https://www.suse.com/security/cve/CVE-2017-17087", }, { category: "external", summary: "SUSE Bug 1065958 for CVE-2017-17087", url: "https://bugzilla.suse.com/1065958", }, { category: "external", summary: "SUSE Bug 1070955 for CVE-2017-17087", url: "https://bugzilla.suse.com/1070955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2017-17087", }, { cve: "CVE-2021-3778", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3778", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3778", url: "https://www.suse.com/security/cve/CVE-2021-3778", }, { category: "external", summary: "SUSE Bug 1190533 for CVE-2021-3778", url: "https://bugzilla.suse.com/1190533", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3796", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3796", url: "https://www.suse.com/security/cve/CVE-2021-3796", }, { category: "external", summary: "SUSE Bug 1190570 for CVE-2021-3796", url: "https://bugzilla.suse.com/1190570", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3796", }, { cve: "CVE-2021-3872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3872", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3872", url: "https://www.suse.com/security/cve/CVE-2021-3872", }, { category: "external", summary: "SUSE Bug 1191893 for CVE-2021-3872", url: "https://bugzilla.suse.com/1191893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3875", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3875", url: "https://www.suse.com/security/cve/CVE-2021-3875", }, { category: "external", summary: "SUSE Bug 1191770 for CVE-2021-3875", url: "https://bugzilla.suse.com/1191770", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3875", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3903", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3903", url: "https://www.suse.com/security/cve/CVE-2021-3903", }, { category: "external", summary: "SUSE Bug 1192167 for CVE-2021-3903", url: "https://bugzilla.suse.com/1192167", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3903", }, { cve: "CVE-2021-3927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3927", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3927", url: "https://www.suse.com/security/cve/CVE-2021-3927", }, { category: "external", summary: "SUSE Bug 1192481 for CVE-2021-3927", url: "https://bugzilla.suse.com/1192481", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3928", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use of Uninitialized Variable", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3928", url: "https://www.suse.com/security/cve/CVE-2021-3928", }, { category: "external", summary: "SUSE Bug 1192478 for CVE-2021-3928", url: "https://bugzilla.suse.com/1192478", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3968", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3968", url: "https://www.suse.com/security/cve/CVE-2021-3968", }, { category: "external", summary: "SUSE Bug 1192902 for CVE-2021-3968", url: "https://bugzilla.suse.com/1192902", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3973", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3973", url: "https://www.suse.com/security/cve/CVE-2021-3973", }, { category: "external", summary: "SUSE Bug 1192903 for CVE-2021-3973", url: "https://bugzilla.suse.com/1192903", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "critical", }, ], title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3974", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3974", url: "https://www.suse.com/security/cve/CVE-2021-3974", }, { category: "external", summary: "SUSE Bug 1192904 for CVE-2021-3974", url: "https://bugzilla.suse.com/1192904", }, { category: "external", summary: "SUSE Bug 1206818 for CVE-2021-3974", url: "https://bugzilla.suse.com/1206818", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3974", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3974", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3984", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3984", url: "https://www.suse.com/security/cve/CVE-2021-3984", }, { category: "external", summary: "SUSE Bug 1193298 for CVE-2021-3984", url: "https://bugzilla.suse.com/1193298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4019", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4019", url: "https://www.suse.com/security/cve/CVE-2021-4019", }, { category: "external", summary: "SUSE Bug 1193294 for CVE-2021-4019", url: "https://bugzilla.suse.com/1193294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-4019", }, { cve: "CVE-2021-4069", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4069", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4069", url: "https://www.suse.com/security/cve/CVE-2021-4069", }, { category: "external", summary: "SUSE Bug 1193466 for CVE-2021-4069", url: "https://bugzilla.suse.com/1193466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-4069", }, { cve: "CVE-2021-4136", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4136", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4136", url: "https://www.suse.com/security/cve/CVE-2021-4136", }, { category: "external", summary: "SUSE Bug 1193905 for CVE-2021-4136", url: "https://bugzilla.suse.com/1193905", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2021-4136", }, { cve: "CVE-2021-4166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4166", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4166", url: "https://www.suse.com/security/cve/CVE-2021-4166", }, { category: "external", summary: "SUSE Bug 1194093 for CVE-2021-4166", url: "https://bugzilla.suse.com/1194093", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-4166", }, { cve: "CVE-2021-4192", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4192", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4192", url: "https://www.suse.com/security/cve/CVE-2021-4192", }, { category: "external", summary: "SUSE Bug 1194217 for CVE-2021-4192", url: "https://bugzilla.suse.com/1194217", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4193", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4193", url: "https://www.suse.com/security/cve/CVE-2021-4193", }, { category: "external", summary: "SUSE Bug 1194216 for CVE-2021-4193", url: "https://bugzilla.suse.com/1194216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2021-4193", }, { cve: "CVE-2021-46059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-46059", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-46059", url: "https://www.suse.com/security/cve/CVE-2021-46059", }, { category: "external", summary: "SUSE Bug 1194556 for CVE-2021-46059", url: "https://bugzilla.suse.com/1194556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-46059", }, { cve: "CVE-2022-0128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0128", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0128", url: "https://www.suse.com/security/cve/CVE-2022-0128", }, { category: "external", summary: "SUSE Bug 1194388 for CVE-2022-0128", url: "https://bugzilla.suse.com/1194388", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-0128", }, { cve: "CVE-2022-0213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0213", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0213", url: "https://www.suse.com/security/cve/CVE-2022-0213", }, { category: "external", summary: "SUSE Bug 1194885 for CVE-2022-0213", url: "https://bugzilla.suse.com/1194885", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0213", }, { cve: "CVE-2022-0261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0261", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0261", url: "https://www.suse.com/security/cve/CVE-2022-0261", }, { category: "external", summary: "SUSE Bug 1194872 for CVE-2022-0261", url: "https://bugzilla.suse.com/1194872", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0318", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0318", url: "https://www.suse.com/security/cve/CVE-2022-0318", }, { category: "external", summary: "SUSE Bug 1195004 for CVE-2022-0318", url: "https://bugzilla.suse.com/1195004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0319", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0319", url: "https://www.suse.com/security/cve/CVE-2022-0319", }, { category: "external", summary: "SUSE Bug 1195066 for CVE-2022-0319", url: "https://bugzilla.suse.com/1195066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0351", }, ], notes: [ { category: "general", text: "Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0351", url: "https://www.suse.com/security/cve/CVE-2022-0351", }, { category: "external", summary: "SUSE Bug 1195126 for CVE-2022-0351", url: "https://bugzilla.suse.com/1195126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0359", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0359", url: "https://www.suse.com/security/cve/CVE-2022-0359", }, { category: "external", summary: "SUSE Bug 1195203 for CVE-2022-0359", url: "https://bugzilla.suse.com/1195203", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0361", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0361", url: "https://www.suse.com/security/cve/CVE-2022-0361", }, { category: "external", summary: "SUSE Bug 1195202 for CVE-2022-0361", url: "https://bugzilla.suse.com/1195202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0361", }, { cve: "CVE-2022-0392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0392", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0392", url: "https://www.suse.com/security/cve/CVE-2022-0392", }, { category: "external", summary: "SUSE Bug 1195332 for CVE-2022-0392", url: "https://bugzilla.suse.com/1195332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0407", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0407", url: "https://www.suse.com/security/cve/CVE-2022-0407", }, { category: "external", summary: "SUSE Bug 1195354 for CVE-2022-0407", url: "https://bugzilla.suse.com/1195354", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2022-0407", }, { cve: "CVE-2022-0413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0413", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0413", url: "https://www.suse.com/security/cve/CVE-2022-0413", }, { category: "external", summary: "SUSE Bug 1195356 for CVE-2022-0413", url: "https://bugzilla.suse.com/1195356", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2022-0413", }, { cve: "CVE-2022-0696", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0696", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0696", url: "https://www.suse.com/security/cve/CVE-2022-0696", }, { category: "external", summary: "SUSE Bug 1196361 for CVE-2022-0696", url: "https://bugzilla.suse.com/1196361", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-0696", url: "https://bugzilla.suse.com/1205395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-0696", }, { cve: "CVE-2022-1381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1381", }, ], notes: [ { category: "general", text: "global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1381", url: "https://www.suse.com/security/cve/CVE-2022-1381", }, { category: "external", summary: "SUSE Bug 1198596 for CVE-2022-1381", url: "https://bugzilla.suse.com/1198596", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1420", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1420", url: "https://www.suse.com/security/cve/CVE-2022-1420", }, { category: "external", summary: "SUSE Bug 1198748 for CVE-2022-1420", url: "https://bugzilla.suse.com/1198748", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1420", }, { cve: "CVE-2022-1616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1616", }, ], notes: [ { category: "general", text: "Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1616", url: "https://www.suse.com/security/cve/CVE-2022-1616", }, { category: "external", summary: "SUSE Bug 1199331 for CVE-2022-1616", url: "https://bugzilla.suse.com/1199331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1619", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1619", url: "https://www.suse.com/security/cve/CVE-2022-1619", }, { category: "external", summary: "SUSE Bug 1199333 for CVE-2022-1619", url: "https://bugzilla.suse.com/1199333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1620", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1620", url: "https://www.suse.com/security/cve/CVE-2022-1620", }, { category: "external", summary: "SUSE Bug 1199334 for CVE-2022-1620", url: "https://bugzilla.suse.com/1199334", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1620", }, { cve: "CVE-2022-1733", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1733", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1733", url: "https://www.suse.com/security/cve/CVE-2022-1733", }, { category: "external", summary: "SUSE Bug 1199655 for CVE-2022-1733", url: "https://bugzilla.suse.com/1199655", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1735", }, ], notes: [ { category: "general", text: "Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1735", url: "https://www.suse.com/security/cve/CVE-2022-1735", }, { category: "external", summary: "SUSE Bug 1199651 for CVE-2022-1735", url: "https://bugzilla.suse.com/1199651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1735", }, { cve: "CVE-2022-1771", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1771", }, ], notes: [ { category: "general", text: "Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1771", url: "https://www.suse.com/security/cve/CVE-2022-1771", }, { category: "external", summary: "SUSE Bug 1199693 for CVE-2022-1771", url: "https://bugzilla.suse.com/1199693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1785", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1785", url: "https://www.suse.com/security/cve/CVE-2022-1785", }, { category: "external", summary: "SUSE Bug 1199745 for CVE-2022-1785", url: "https://bugzilla.suse.com/1199745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1796", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.4979.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1796", url: "https://www.suse.com/security/cve/CVE-2022-1796", }, { category: "external", summary: "SUSE Bug 1199747 for CVE-2022-1796", url: "https://bugzilla.suse.com/1199747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1851", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1851", url: "https://www.suse.com/security/cve/CVE-2022-1851", }, { category: "external", summary: "SUSE Bug 1199936 for CVE-2022-1851", url: "https://bugzilla.suse.com/1199936", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1897", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1897", url: "https://www.suse.com/security/cve/CVE-2022-1897", }, { category: "external", summary: "SUSE Bug 1200010 for CVE-2022-1897", url: "https://bugzilla.suse.com/1200010", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1898", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1898", url: "https://www.suse.com/security/cve/CVE-2022-1898", }, { category: "external", summary: "SUSE Bug 1200011 for CVE-2022-1898", url: "https://bugzilla.suse.com/1200011", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1927", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1927", url: "https://www.suse.com/security/cve/CVE-2022-1927", }, { category: "external", summary: "SUSE Bug 1200012 for CVE-2022-1927", url: "https://bugzilla.suse.com/1200012", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1927", }, ], }
var-202205-1990
Vulnerability from variot
Buffer Over-read in GitHub repository vim/vim prior to 8.2. vim/vim Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Vim is a cross-platform text editor. Vim versions prior to 8.2 have a security vulnerability caused by buffer overreading. Summary:
Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.11.0 on Red Hat Enterprise Linux 8. Description:
Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.
Security Fix(es):
-
eventsource: Exposure of Sensitive Information (CVE-2022-1650)
-
moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)
-
nodejs-set-value: type confusion allows bypass of CVE-2019-10747 (CVE-2021-23440)
-
nanoid: Information disclosure via valueOf() function (CVE-2021-23566)
-
node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)
-
follow-redirects: Exposure of Sensitive Information via Authorization Header leak (CVE-2022-0536)
-
prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
-
golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)
-
golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)
-
golang: crypto/elliptic: IsOnCurve returns true for invalid field elements (CVE-2022-23806)
-
golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
-
node-forge: Signature verification leniency in checking
digestAlgorithm
structure can lead to signature forgery (CVE-2022-24771) -
node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery (CVE-2022-24772)
-
node-forge: Signature verification leniency in checking
DigestInfo
structure (CVE-2022-24773) -
Moment.js: Path traversal in moment.locale (CVE-2022-24785)
-
golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)
-
golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
-
golang: syscall: faccessat checks wrong group (CVE-2022-29526)
-
go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses (CVE-2022-29810)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
These updated images include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:
https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.11/html/4.11_release_notes/index
All Red Hat OpenShift Data Foundation users are advised to upgrade to these updated images, which provide numerous bug fixes and enhancements. Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):
1937117 - Deletion of StorageCluster doesn't remove ceph toolbox pod
1947482 - The device replacement process when deleting the volume metadata need to be fixed or modified
1973317 - libceph: read_partial_message and bad crc/signature errors
1996829 - Permissions assigned to ceph auth principals when using external storage are too broad
2004944 - CVE-2021-23440 nodejs-set-value: type confusion allows bypass of CVE-2019-10747
2027724 - Warning log for rook-ceph-toolbox in ocs-operator log
2029298 - [GSS] Noobaa is not compatible with aws bucket lifecycle rule creation policies
2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor
2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter
2047173 - [RFE] Change controller-manager pod name in odf-lvm-operator to more relevant name to lvm
2050853 - CVE-2021-23566 nanoid: Information disclosure via valueOf() function
2050897 - CVE-2022-0235 mcg-core-container: node-fetch: exposure of sensitive information to an unauthorized actor [openshift-data-foundation-4]
2053259 - CVE-2022-0536 follow-redirects: Exposure of Sensitive Information via Authorization Header leak
2053429 - CVE-2022-23806 golang: crypto/elliptic: IsOnCurve returns true for invalid field elements
2053532 - CVE-2022-23772 golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString
2053541 - CVE-2022-23773 golang: cmd/go: misinterpretation of branch names can lead to incorrect access control
2056697 - odf-csi-addons-operator subscription failed while using custom catalog source
2058211 - Add validation for CIDR field in DRPolicy
2060487 - [ODF to ODF MS] Consumer lost connection to provider API if the endpoint node is powered off/replaced
2060790 - ODF under Storage missing for OCP 4.11 + ODF 4.10
2061713 - [KMS] The error message during creation of encrypted PVC mentions the parameter in UPPER_CASE
2063691 - [GSS] [RFE] Add termination policy to s3 route
2064426 - [GSS][External Mode] exporter python script does not support FQDN for RGW endpoint
2064857 - CVE-2022-24921 golang: regexp: stack exhaustion via a deeply nested expression
2066514 - OCS operator to install Ceph prometheus alerts instead of Rook
2067079 - [GSS] [RFE] Add termination policy to ocs-storagecluster-cephobjectstore route
2067387 - CVE-2022-24771 node-forge: Signature verification leniency in checking digestAlgorithm
structure can lead to signature forgery
2067458 - CVE-2022-24772 node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery
2067461 - CVE-2022-24773 node-forge: Signature verification leniency in checking DigestInfo
structure
2069314 - OCS external mode should allow specifying names for all Ceph auth principals
2069319 - [RFE] OCS CephFS External Mode Multi-tenancy. Add cephfs subvolumegroup and path= caps per cluster.
2069812 - must-gather: rbd_vol_and_snap_info collection is broken
2069815 - must-gather: essential rbd mirror command outputs aren't collected
2070542 - After creating a new storage system it redirects to 404 error page instead of the "StorageSystems" page for OCP 4.11
2071494 - [DR] Applications are not getting deployed
2072009 - CVE-2022-24785 Moment.js: Path traversal in moment.locale
2073920 - rook osd prepare failed with this error - failed to set kek as an environment variable: key encryption key is empty
2074810 - [Tracker for Bug 2074585] MCG standalone deployment page goes blank when the KMS option is enabled
2075426 - 4.10 must gather is not available after GA of 4.10
2075581 - [IBM Z] : ODF 4.11.0-38 deployment leaves the storagecluster in "Progressing" state although all the openshift-storage pods are up and Running
2076457 - After node replacement[provider], connection issue between consumer and provider if the provider node which was referenced MON-endpoint configmap (on consumer) is lost
2077242 - vg-manager missing permissions
2077688 - CVE-2022-24675 golang: encoding/pem: fix stack overflow in Decode
2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar
2079866 - [DR] odf-multicluster-console is in CLBO state
2079873 - csi-nfsplugin pods are not coming up after successful patch request to update "ROOK_CSI_ENABLE_NFS": "true"'
2080279 - CVE-2022-29810 go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses
2081680 - Add the LVM Operator into the Storage category in OperatorHub
2082028 - UI does not have the option to configure capacity, security and networks,etc. during storagesystem creation
2082078 - OBC's not getting created on primary cluster when manageds3 set as "true" for mirrorPeer
2082497 - Do not filter out removable devices
2083074 - [Tracker for Ceph BZ #2086419] Two Ceph mons crashed in ceph-16.2.7/src/mon/PaxosService.cc: 193: FAILED ceph_assert(have_pending)
2083441 - LVM operator should deploy the volumesnapshotclass resource
2083953 - [Tracker for Ceph BZ #2084579] PVC created with ocs-storagecluster-ceph-nfs storageclass is moving to pending status
2083993 - Add missing pieces for storageclassclaim
2084041 - [Console Migration] Link-able storage system name directs to blank page
2084085 - CVE-2022-29526 golang: syscall: faccessat checks wrong group
2084201 - MCG operator pod is stuck in a CrashLoopBackOff; Panic Attack: [] an empty namespace may not be set when a resource name is provided"
2084503 - CLI falsely flags unique PVPool backingstore secrets as duplicates
2084546 - [Console Migration] Provider details absent under backing store in UI
2084565 - [Console Migration] The creation of new backing store , directs to a blank page
2085307 - CVE-2022-1650 eventsource: Exposure of Sensitive Information
2085351 - [DR] Mirrorpeer failed to create with msg Internal error occurred
2085357 - [DR] When drpolicy is create drcluster resources are getting created under default namespace
2086557 - Thin pool in lvm operator doesn't use all disks
2086675 - [UI]No option to "add capacity" via the Installed Operators tab
2086982 - ODF 4.11 deployment is failing
2086983 - [odf-clone] Mons IP not updated correctly in the rook-ceph-mon-endpoints cm
2087078 - [RDR] [UI] Multiple instances of Object Bucket, Object Bucket Claims and 'Overview' tab is present under Storage section on the Hub cluster when navigated back from the Managed cluster using the Hybrid console dropdown
2087107 - Set default storage class if none is set
2087237 - [UI] After clicking on Create StorageSystem, it navigates to Storage Systems tab but shows an error message
2087675 - ocs-metrics-exporter pod crashes on odf v4.11
2087732 - [Console Migration] Events page missing under new namespace store
2087755 - [Console Migration] Bucket Class details page doesn't have the complete details in UI
2088359 - Send VG Metrics even if storage is being consumed from thinPool alone
2088380 - KMS using vault on standalone MCG cluster is not enabled
2088506 - ceph-external-cluster-details-exporter.py should not accept hostname for rgw-endpoint
2088587 - Removal of external storage system with misconfigured cephobjectstore fails on noobaa webhook
2089296 - [MS v2] Storage cluster in error phase and 'ocs-provider-qe' addon installation failed with ODF 4.10.2
2089342 - prometheus pod goes into OOMKilled state during ocs-osd-controller-manager pod restarts
2089397 - [GSS]OSD pods CLBO after upgrade to 4.10 from 4.9.
2089552 - [MS v2] Cannot create StorageClassClaim
2089567 - [Console Migration] Improve the styling of Various Components
2089786 - [Console Migration] "Attach to deployment" option is missing in kebab menu for Object Bucket Claims .
2089795 - [Console Migration] Yaml and Events page is missing for Object Bucket Claims and Object Bucket.
2089797 - [RDR] rbd image failed to mount with msg rbd error output: rbd: sysfs write failed
2090278 - [LVMO] Some containers are missing resource requirements and limits
2090314 - [LVMO] CSV is missing some useful annotations
2090953 - [MCO] DRCluster created under default namespace
2091487 - [Hybrid Console] Multicluster dashboard is not displaying any metrics
2091638 - [Console Migration] Yaml page is missing for existing and newly created Block pool.
2091641 - MCG operator pod is stuck in a CrashLoopBackOff; MapSecretToNamespaceStores invalid memory address or nil pointer dereference
2091681 - Auto replication policy type detection is not happneing on DRPolicy creation page when ceph cluster is external
2091894 - All backingstores in cluster spontaneously change their own secret
2091951 - [GSS] OCS pods are restarting due to liveness probe failure
2091998 - Volume Snapshots not work with external restricted mode
2092143 - Deleting a CephBlockPool CR does not delete the underlying Ceph pool
2092217 - [External] UI for uploding JSON data for external cluster connection has some strict checks
2092220 - [Tracker for Ceph BZ #2096882] CephNFS is not reaching to Ready state on ODF on IBM Power (ppc64le)
2092349 - Enable zeroing on the thin-pool during creation
2092372 - [MS v2] StorageClassClaim is not reaching Ready Phase
2092400 - [MS v2] StorageClassClaim creation is failing with error "no StorageCluster found"
2093266 - [RDR] When mirroring is enabled rbd mirror daemon restart config should be enabled automatically
2093848 - Note about token for encrypted PVCs should be removed when only cluster wide encryption checkbox is selected
2094179 - MCO fails to create DRClusters when replication mode is synchronous
2094853 - [Console Migration] Description under storage class drop down in add capacity is missing .
2094856 - [KMS] PVC creation using vaulttenantsa method is failing due to token secret missing in serviceaccount
2095155 - Use tool black
to format the python external script
2096209 - ReclaimSpaceJob fails on OCP 4.11 + ODF 4.10 cluster
2096414 - Compression status for cephblockpool is reported as Enabled and Disabled at the same time
2096509 - [Console Migration] Unable to select Storage Class in Object Bucket Claim creation page
2096513 - Infinite BlockPool tabs get created when the StorageSystem details page is opened
2096823 - After upgrading the cluster from ODF4.10 to ODF4.11, the ROOK_CSI_ENABLE_CEPHFS move to False
2096937 - Storage - Data Foundation: i18n misses
2097216 - Collect StorageClassClaim details in must-gather
2097287 - [UI] Dropdown doesn't close on it's own after arbiter zone selection on 'Capacity and nodes' page
2097305 - Add translations for ODF 4.11
2098121 - Managed ODF not getting detected
2098261 - Remove BlockPools(no use case) and Object(redundat with Overview) tab on the storagesystem page for NooBaa only and remove BlockPools tab for External mode deployment
2098536 - [KMS] PVC creation using vaulttenantsa method is failing due to token secret missing in serviceaccount
2099265 - [KMS] The storagesystem creation page goes blank when KMS is enabled
2099581 - StorageClassClaim with encryption gets into Failed state
2099609 - The red-hat-storage/topolvm release-4.11 needs to be synced with the upstream project
2099646 - Block pool list page kebab action menu is showing empty options
2099660 - OCS dashbaords not appearing unless user clicks on "Overview" Tab
2099724 - S3 secret namespace on the managed cluster doesn't match with the namespace in the s3profile
2099965 - rbd: provide option to disable setting metadata on RBD images
2100326 - [ODF to ODF] Volume snapshot creation failed
2100352 - Make lvmo pod labels more uniform
2100946 - Avoid temporary ceph health alert for new clusters where the insecure global id is allowed longer than necessary
2101139 - [Tracker for OCP BZ #2102782] topolvm-controller get into CrashLoopBackOff few minutes after install
2101380 - Default backingstore is rejected with message INVALID_SCHEMA_PARAMS SERVER account_api#/methods/check_external_connection
2103818 - Restored snapshot don't have any content
2104833 - Need to update configmap for IBM storage odf operator GA
2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS
- Solution:
The OpenShift Service Mesh Release Notes provide information on the features and known issues:
https://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html
- Bugs fixed (https://bugzilla.redhat.com/):
2107371 - CVE-2022-30630 golang: io/fs: stack exhaustion in Glob 2107376 - CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions 2107386 - CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob 2107388 - CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode 2107390 - CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip 2107392 - CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal
- JIRA issues fixed (https://issues.jboss.org/):
OSSM-1105 - IOR doesn't support a host with namespace/ prefix OSSM-1205 - Specifying logging parameter will make istio-ingressgateway and istio-egressgateway failed to start OSSM-1668 - [Regression] jwksResolverCA field in SMCP is missing OSSM-1718 - Istio Operator pauses reconciliation when gateway deployed to non-control plane namespace OSSM-1775 - [Regression] Incorrect 3scale image specified for 2.0 control planes OSSM-1800 - IOR should copy labels from Gateway to Route OSSM-1805 - Reconcile SMCP when Kiali is not available OSSM-1846 - SMCP fails to reconcile when enabling PILOT_ENABLE_GATEWAY_API_DEPLOYMENT_CONTROLLER OSSM-1868 - Container release for Maistra 2.2.2
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: Logging Subsystem 5.5.0 - Red Hat OpenShift security update Advisory ID: RHSA-2022:6051-01 Product: RHOL Advisory URL: https://access.redhat.com/errata/RHSA-2022:6051 Issue date: 2022-08-18 CVE Names: CVE-2021-38561 CVE-2022-0759 CVE-2022-1012 CVE-2022-1292 CVE-2022-1586 CVE-2022-1785 CVE-2022-1897 CVE-2022-1927 CVE-2022-2068 CVE-2022-2097 CVE-2022-21698 CVE-2022-30631 CVE-2022-32250 ==================================================================== 1. Summary:
An update is now available for RHOL-5.5-RHEL-8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Description:
Logging Subsystem 5.5.0 - Red Hat OpenShift
Security Fix(es):
-
kubeclient: kubeconfig parsing error can lead to MITM attacks (CVE-2022-0759)
-
golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
-
golang: out-of-bounds read in golang.org/x/text/language leads to DoS (CVE-2021-38561)
-
prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 2058404 - CVE-2022-0759 kubeclient: kubeconfig parsing error can lead to MITM attacks 2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS 2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read
- JIRA issues fixed (https://issues.jboss.org/):
LOG-1415 - Allow users to tune fluentd
LOG-1539 - Events and CLO csv are not collected after running oc adm must-gather --image=$downstream-clo-image
LOG-1713 - Reduce Permissions granted for prometheus-k8s service account
LOG-2063 - Collector pods fail to start when a Vector only Cluster Logging instance is created.
LOG-2134 - The infra logs are sent to app-xx indices
LOG-2159 - Cluster Logging Pods in CrashLoopBackOff
LOG-2165 - [Vector] Default log level debug makes it hard to find useful error/failure messages.
LOG-2167 - [Vector] Collector pods fails to start with configuration error when using Kafka SASL over SSL
LOG-2169 - [Vector] Logs not being sent to Kafka with SASL plaintext.
LOG-2172 - [vector]The openshift-apiserver and ovn audit logs can not be collected.
LOG-2242 - Log file metric exporter is still following /var/log/containers files.
LOG-2243 - grafana-dashboard-cluster-logging should be deleted once clusterlogging/instance was removed
LOG-2264 - Logging link should contain an icon
LOG-2274 - [Logging 5.5] EO doesn't recreate secrets kibana and kibana-proxy after removing them.
LOG-2276 - Fluent config format is hard to read via configmap
LOG-2290 - ClusterLogging Instance status in not getting updated in UI
LOG-2291 - [release-5.5] Events listing out of order in Kibana 6.8.1
LOG-2294 - [Vector] Vector internal metrics are not exposed via HTTPS due to which OpenShift Monitoring Prometheus service cannot scrape the metrics endpoint.
LOG-2300 - [Logging 5.5]ES pods can't be ready after removing secret/signing-elasticsearch
LOG-2303 - [Logging 5.5] Elasticsearch cluster upgrade stuck
LOG-2308 - configmap grafana-dashboard-elasticsearch is being created and deleted continously
LOG-2333 - Journal logs not reaching Elasticsearch output
LOG-2337 - [Vector] Missing @ prefix from the timestamp field in log record.
LOG-2342 - [Logging 5.5] Kibana pod can't connect to ES cluster after removing secret/signing-elasticsearch: "x509: certificate signed by unknown authority"
LOG-2384 - Provide a method to get authenticated from GCP
LOG-2411 - [Vector] Audit logs forwarding not working.
LOG-2412 - CLO's loki output url is parsed wrongly
LOG-2413 - PriorityClass cluster-logging is deleted if provide an invalid log type
LOG-2418 - EO supported time units don't match the units specified in CRDs.
LOG-2439 - Telemetry: the managedStatus&healthStatus&version values are wrong
LOG-2440 - [loki-operator] Live tail of logs does not work on OpenShift
LOG-2444 - The write index is removed when the size of the index
> diskThresholdPercent% * total size
.
LOG-2460 - [Vector] Collector pods fail to start on a FIPS enabled cluster.
LOG-2461 - [Vector] Vector auth config not generated when user provided bearer token is used in a secret for connecting to LokiStack.
LOG-2463 - Elasticsearch operator repeatedly prints error message when checking indices
LOG-2474 - EO shouldn't grant cluster-wide permission to system:serviceaccount:openshift-monitoring:prometheus-k8s when ES cluster is deployed. [openshift-logging 5.5]
LOG-2522 - CLO supported time units don't match the units specified in CRDs.
LOG-2525 - The container's logs are not sent to separate index if the annotation is added after the pod is ready.
LOG-2546 - TLS handshake error on loki-gateway for FIPS cluster
LOG-2549 - [Vector] [master] Journald logs not sent to the Log store when using Vector as collector.
LOG-2554 - [Vector] [master] Fallback index is not used when structuredTypeKey is missing from JSON log data
LOG-2588 - FluentdQueueLengthIncreasing rule failing to be evaluated.
LOG-2596 - [vector]the condition in [transforms.route_container_logs] is inaccurate
LOG-2599 - Supported values for level field don't match documentation
LOG-2605 - $labels.instance is empty in the message when firing FluentdNodeDown alert
LOG-2609 - fluentd and vector are unable to ship logs to elasticsearch when cluster-wide proxy is in effect
LOG-2619 - containers violate PodSecurity -- Log Exporation
LOG-2627 - containers violate PodSecurity -- Loki
LOG-2649 - Level Critical should match the beginning of the line as the other levels
LOG-2656 - Logging uses deprecated v1beta1 apis
LOG-2664 - Deprecated Feature logs causing too much noise
LOG-2665 - [Logging 5.5] Sometimes collector fails to push logs to Elasticsearch cluster
LOG-2693 - Integration with Jaeger fails for ServiceMonitor
LOG-2700 - [Vector] vector container can't start due to "unknown field pod_annotation_fields
" .
LOG-2703 - Collector DaemonSet is not removed when CLF is deleted for fluentd/vector only CL instance
LOG-2725 - Upgrade logging-eventrouter Golang version and tags
LOG-2731 - CLO keeps reporting Reconcile ServiceMonitor retry error
and Reconcile Service retry error
after creating clusterlogging.
LOG-2732 - Prometheus Operator pod throws 'skipping servicemonitor' error on Jaeger integration
LOG-2742 - unrecognized outputs when use the sts role secret
LOG-2746 - CloudWatch forwarding rejecting large log events, fills tmpfs
LOG-2749 - OpenShift Logging Dashboard for Elastic Shards shows "active_primary" instead of "active" shards.
LOG-2753 - Update Grafana configuration for LokiStack integration on grafana/loki repo
LOG-2763 - [Vector]{Master} Vector's healthcheck fails when forwarding logs to Lokistack.
LOG-2764 - ElasticSearch operator does not respect referencePolicy when selecting oauth-proxy image
LOG-2765 - ingester pod can not be started in IPv6 cluster
LOG-2766 - [vector] failed to parse cluster url: invalid authority IPv6 http-proxy
LOG-2772 - arn validation failed when role_arn=arn:aws-us-gov:xxx
LOG-2773 - No cluster-logging-operator-metrics service in logging 5.5
LOG-2778 - [Vector] [OCP 4.11] SA token not added to Vector config when connecting to LokiStack instance without CLF creds secret required by LokiStack.
LOG-2784 - Japanese log messages are garbled at Kibana
LOG-2793 - [Vector] OVN audit logs are missing the level field.
LOG-2864 - [vector] Can not sent logs to default when loki is the default output in CLF
LOG-2867 - [fluentd] All logs are sent to application tenant when loki is used as default logstore in CLF.
LOG-2873 - [Vector] Cannot configure CPU/Memory requests/limits when using Vector as collector.
LOG-2875 - Seeing a black rectangle box on the graph in Logs view
LOG-2876 - The link to the 'Container details' page on the 'Logs' screen throws error
LOG-2877 - When there is no query entered, seeing error message on the Logs view
LOG-2882 - RefreshIntervalDropdown and TimeRangeDropdown always set back to its original values when switching between pages in 'Logs' screen
- References:
https://access.redhat.com/security/cve/CVE-2021-38561 https://access.redhat.com/security/cve/CVE-2022-0759 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1292 https://access.redhat.com/security/cve/CVE-2022-1586 https://access.redhat.com/security/cve/CVE-2022-1785 https://access.redhat.com/security/cve/CVE-2022-1897 https://access.redhat.com/security/cve/CVE-2022-1927 https://access.redhat.com/security/cve/CVE-2022-2068 https://access.redhat.com/security/cve/CVE-2022-2097 https://access.redhat.com/security/cve/CVE-2022-21698 https://access.redhat.com/security/cve/CVE-2022-30631 https://access.redhat.com/security/cve/CVE-2022-32250 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYv5/w9zjgjWX9erEAQhRBBAAiZe24VtCQruCG/MvGEOowBvHf/YNANlR N6WAw2VezEfvFkG7z599MWZVWz2jnZO6cn9i+CoNDanAmItPJ8ljK4sitrP2ywrG OKwqIa4DPrywFFTSMxemB604ewE0cvXifuqG5bQDn+GvndiV/u/XaVTYZseY1P5X 8ZIJ20cxROOE9pg0/3eya27edZxDrgWx6BtzSEZw47ReV3Dogqy+KzRCAAoN+pE5 g2t/E0u0Ypmjil9Ttsop/ejUg/iz8UTGtua4m1nzhZrsoE84p5xIgvCEkYlh3OrD tfawpj1r9Avcjk4zbZkAe/enSQZQv0iWD792SoP7/ddX5tIu05ArvPWj/NvN/rI4 dFzMe2UmezuS2EQpzaWOug2xSQUbR1hI+Y4cy0YOHuwzeaMeoHSbNYTJmOxKR0v1 44a9oSBku+Xfk8nUNqS+9oq0z3DlAWt2BjbfrJCbSjZQdOUOIGM95L3ClrXY9LYF PT5v+h2W4myonj6HVhkv+Wy7aRbYQ7Qhk/3AaN7Dz5soBSNK4exvOzWXGuf/BdSf XFef6O87ipZveHQYmTfH+t8aJV1plEVTrm8pyz2EfzCv1Fnhjn0rvbGZAFBlvqW+ vhxoj505RQBBhcno16V1zczdd8KsiqY7aZniTuh2DQAVvNhqsHgn8rvQ7HJlExun eIFVKOxx310=ynB/ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Bugs fixed (https://bugzilla.redhat.com/):
2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read 2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header 2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
RHEL-8-CNV-4.12
============= bridge-marker-container-v4.12.0-24 cluster-network-addons-operator-container-v4.12.0-24 cnv-containernetworking-plugins-container-v4.12.0-24 cnv-must-gather-container-v4.12.0-58 hco-bundle-registry-container-v4.12.0-769 hostpath-csi-driver-container-v4.12.0-30 hostpath-provisioner-container-v4.12.0-30 hostpath-provisioner-operator-container-v4.12.0-31 hyperconverged-cluster-operator-container-v4.12.0-96 hyperconverged-cluster-webhook-container-v4.12.0-96 kubemacpool-container-v4.12.0-24 kubevirt-console-plugin-container-v4.12.0-182 kubevirt-ssp-operator-container-v4.12.0-64 kubevirt-tekton-tasks-cleanup-vm-container-v4.12.0-55 kubevirt-tekton-tasks-copy-template-container-v4.12.0-55 kubevirt-tekton-tasks-create-datavolume-container-v4.12.0-55 kubevirt-tekton-tasks-create-vm-from-template-container-v4.12.0-55 kubevirt-tekton-tasks-disk-virt-customize-container-v4.12.0-55 kubevirt-tekton-tasks-disk-virt-sysprep-container-v4.12.0-55 kubevirt-tekton-tasks-modify-vm-template-container-v4.12.0-55 kubevirt-tekton-tasks-operator-container-v4.12.0-40 kubevirt-tekton-tasks-wait-for-vmi-status-container-v4.12.0-55 kubevirt-template-validator-container-v4.12.0-32 libguestfs-tools-container-v4.12.0-255 ovs-cni-marker-container-v4.12.0-24 ovs-cni-plugin-container-v4.12.0-24 virt-api-container-v4.12.0-255 virt-artifacts-server-container-v4.12.0-255 virt-cdi-apiserver-container-v4.12.0-72 virt-cdi-cloner-container-v4.12.0-72 virt-cdi-controller-container-v4.12.0-72 virt-cdi-importer-container-v4.12.0-72 virt-cdi-operator-container-v4.12.0-72 virt-cdi-uploadproxy-container-v4.12.0-71 virt-cdi-uploadserver-container-v4.12.0-72 virt-controller-container-v4.12.0-255 virt-exportproxy-container-v4.12.0-255 virt-exportserver-container-v4.12.0-255 virt-handler-container-v4.12.0-255 virt-launcher-container-v4.12.0-255 virt-operator-container-v4.12.0-255 virtio-win-container-v4.12.0-10 vm-network-latency-checkup-container-v4.12.0-89
- Bugs fixed (https://bugzilla.redhat.com/):
1719190 - Unable to cancel live-migration if virt-launcher pod in pending state
2023393 - [CNV] [UI]Additional information needed for cloning when default storageclass in not defined in target datavolume
2030801 - CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache
2030806 - CVE-2021-44717 golang: syscall: don't close fd 0 on ForkExec error
2040377 - Unable to delete failed VMIM after VM deleted
2046298 - mdevs not configured with drivers installed, if mdev config added to HCO CR before drivers are installed
2052556 - Metric "kubevirt_num_virt_handlers_by_node_running_virt_launcher" reporting incorrect value
2053429 - CVE-2022-23806 golang: crypto/elliptic: IsOnCurve returns true for invalid field elements
2053532 - CVE-2022-23772 golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString
2053541 - CVE-2022-23773 golang: cmd/go: misinterpretation of branch names can lead to incorrect access control
2060499 - [RFE] Cannot add additional service (or other objects) to VM template
2069098 - Large scale |VMs migration is slow due to low migration parallelism
2070366 - VM Snapshot Restore hangs indefinitely when backed by a snapshotclass
2071491 - Storage Throughput metrics are incorrect in Overview
2072797 - Metrics in Virtualization -> Overview period is not clear or configurable
2072821 - Top Consumers of Storage Traffic in Kubevirt Dashboard giving unexpected numbers
2079916 - KubeVirt CR seems to be in DeploymentInProgress state and not recovering
2084085 - CVE-2022-29526 golang: syscall: faccessat checks wrong group
2086285 - [dark mode] VirtualMachine - in the Utilization card the percentages and the graphs not visible enough in dark mode
2086551 - Min CPU feature found in labels
2087724 - Default template show no boot source even there are auto-upload boot sources
2088129 - [SSP] webhook does not comply with restricted security context
2088464 - [CDI] cdi-deployment does not comply with restricted security context
2089391 - Import gzipped raw file causes image to be downloaded and uncompressed to TMPDIR
2089744 - HCO should label its control plane namespace to admit pods at privileged security level
2089751 - 4.12.0 containers
2089804 - 4.12.0 rpms
2091856 - ?Edit BootSource? action should have more explicit information when disabled
2092793 - CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add
2092796 - [RFE] CPU|Memory display in the template card is not consistent with the display in the template drawer
2093771 - The disk source should be PVC if the template has no auto-update boot source
2093996 - kubectl get vmi API should always return primary interface if exist
2094202 - Cloud-init username field should have hint
2096285 - KubeVirt CR API documentation is missing docs for many fields
2096780 - [RFE] Add ssh-key and sysprep to template scripts tab
2097436 - Online disk expansion ignores filesystem overhead change
2097586 - AccessMode should stay on ReadWriteOnce while editing a disk with storage class HPP
2099556 - [RFE] Add option to enable RDP service for windows vm
2099573 - [RFE] Improve template's message about not editable
2099923 - [RFE] Merge "SSH access" and "SSH command" into one
2100290 - Error is not dismissed on catalog review page
2100436 - VM list filtering ignores VMs in error-states
2100442 - [RFE] allow enabling and disabling SSH service while VM is shut down
2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS
2100629 - Update nested support KBASE article
2100679 - The number of hardware devices is not correct in vm overview tab
2100682 - All hardware devices get deleted while just delete one
2100684 - Workload profile are not editable during creation and after creation
2101144 - VM filter has two "Other" checkboxes which are triggered together
2101164 - [dark mode] Number of alerts in Alerts card not visible enough in dark mode
2101167 - Edit buttons clickable area is too large.
2101333 - [e2e] elements on Template Scheduling tab are missing proper data-test-id
2101335 - Clone action enabled in VM list kebab button for a VM in CrashLoopBackOff state
2101390 - Easy to miss the "tick" when adding GPU device to vm via UI
2101394 - [e2e] elements on VM Scripts tab are missing proper data-test-id
2101423 - wrong user name on using ignition
2101430 - Using CLOUD_USER_PASSWORD in Templates parameters breaks VM review page
2101445 - "Pending changes - Boot Order"
2101454 - Cannot add PVC boot source to template in 'Edit Boot Source Reference' view as a non-priv user
2101499 - Cannot add NIC to VM template as non-priv user
2101501 - NAME parameter in VM template has no effect.
2101628 - non-priv user cannot load dataSource while edit template's rootdisk
2101667 - VMI view is not aligned with vm and tempates
2101681 - All templates are labeling "source available" in template list page
2102074 - VM Creation time on VM Overview Details card lacks string
2102125 - vm clone modal is displaying DV size instead of PVC size
2102132 - align the utilization card of single VM overview with the design
2102138 - Should the word "new" be removed from "Create new VirtualMachine from catalog"?
2102256 - Add button moved to right
2102448 - VM disk is deleted by uncheck "Delete disks (1x)" on delete modal
2102475 - Template 'vm-template-example' should be filtered by 'Fedora' rather than 'Other'
2102561 - sysprep-info should link to downstream doc
2102737 - Clone a VM should lead to vm overview tab
2102740 - "Save" button on vm clone modal should be "Clone"
2103806 - "404: Not Found" appears shortly by clicking the PVC link on vm disk tab
2103807 - PVC is not named by VM name while creating vm quickly
2103817 - Workload profile values in vm details should align with template's value
2103844 - VM nic model is empty
2104331 - VM list page scroll up automatically
2104402 - VM create button is not enabled while adding multiple environment disks
2104422 - Storage status report "OpenShift Data Foundation is not available" even the operator is installed
2104424 - Enable descheduler or hide it on template's scheduling tab
2104479 - [4.12] Cloned VM's snapshot restore fails if the source VM disk is deleted
2104480 - Alerts in VM overview tab disappeared after a few seconds
2104785 - "Add disk" and "Disks" are on the same line
2104859 - [RFE] Add "Copy SSH command" to VM action list
2105257 - Can't set log verbosity level for virt-operator pod
2106175 - All pages are crashed after visit Virtualization -> Overview
2106963 - Cannot add configmap for windows VM
2107279 - VM Template's bootable disk can be marked as bootable
2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read
2107371 - CVE-2022-30630 golang: io/fs: stack exhaustion in Glob
2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header
2107376 - CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse functions
2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
2107386 - CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob
2107388 - CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode
2107390 - CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip
2107392 - CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal
2108339 - datasource does not provide timestamp when updated
2108638 - When chosing a vm or template while in all-namespace, and returning to list, namespace is changed
2109818 - Upstream metrics documentation is not detailed enough
2109975 - DataVolume fails to import "cirros-container-disk-demo" image
2110256 - Storage -> PVC -> upload data, does not support source reference
2110562 - CNV introduces a compliance check fail in "ocp4-moderate" profile - routes-protected-by-tls
2111240 - GiB changes to B in Template's Edit boot source reference modal
2111292 - kubevirt plugin console is crashed after creating a vm with 2 nics
2111328 - kubevirt plugin console crashed after visit vmi page
2111378 - VM SSH command generated by UI points at api VIP
2111744 - Cloned template should not label app.kubernetes.io/name: common-templates
2111794 - the virtlogd process is taking too much RAM! (17468Ki > 17Mi)
2112900 - button style are different
2114516 - Nothing happens after clicking on Fedora cloud image list link
2114636 - The style of displayed items are not unified on VM tabs
2114683 - VM overview tab is crashed just after the vm is created
2115257 - Need to Change system-product-name to "OpenShift Virtualization" in CNV-4.12
2115258 - The storageclass of VM disk is different from quick created and customize created after changed the default storageclass
2115280 - [e2e] kubevirt-e2e-aws see two duplicated navigation items
2115769 - Machine type is updated to rhel8.6.0 in KV CR but not in Templates
2116225 - The filter keyword of the related operator 'Openshift Data Foundation' is 'OCS' rather than 'ODF'
2116644 - Importer pod is failing to start with error "MountVolume.SetUp failed for volume "cdi-proxy-cert-vol" : configmap "custom-ca" not found"
2117549 - Cannot edit cloud-init data after add ssh key
2117803 - Cannot edit ssh even vm is stopped
2117813 - Improve descriptive text of VM details while VM is off
2117872 - CVE-2022-1798 kubeVirt: Arbitrary file read on the host from KubeVirt VMs
2118257 - outdated doc link tolerations modal
2118823 - Deprecated API 1.25 call: virt-cdi-controller/v0.0.0 (linux/amd64) kubernetes/$Format
2119069 - Unable to start windows VMs on PSI setups
2119128 - virt-launcher cannot be started on OCP 4.12 due to PodSecurity restricted:v1.24
2119309 - readinessProbe in VM stays on failed
2119615 - Change the disk size causes the unit changed
2120907 - Cannot filter disks by label
2121320 - Negative values in migration metrics
2122236 - Failing to delete HCO with SSP sticking around
2122990 - VMExport should check APIGroup
2124147 - "ReadOnlyMany" should not be added to supported values in memory dump
2124307 - Ui crash/stuck on loading when trying to detach disk on a VM
2124528 - On upgrade, when live-migration is failed due to an infra issue, virt-handler continuously and endlessly tries to migrate it
2124555 - View documentation link on MigrationPolicies page des not work
2124557 - MigrationPolicy description is not displayed on Details page
2124558 - Non-privileged user can start MigrationPolicy creation
2124565 - Deleted DataSource reappears in list
2124572 - First annotation can not be added to DataSource
2124582 - Filtering VMs by OS does not work
2124594 - Docker URL validation is inconsistent over application
2124597 - Wrong case in Create DataSource menu
2126104 - virtctl image-upload hangs waiting for pod to be ready with missing access mode defined in the storage profile
2126397 - many KubeVirtComponentExceedsRequestedMemory alerts in Firing state
2127787 - Expose the PVC source of the dataSource on UI
2127843 - UI crashed by selecting "Live migration network"
2127931 - Change default time range on Virtualization -> Overview -> Monitoring dashboard to 30 minutes
2127947 - cluster-network-addons-config tlsSecurityProfle takes a long time to update after setting APIServer
2128002 - Error after VM template deletion
2128107 - sriov-manage command fails to enable SRIOV Virtual functions on the Ampere GPU Cards
2128872 - [4.11]Can't restore cloned VM
2128948 - Cannot create DataSource from default YAML
2128949 - Cannot create MigrationPolicy from example YAML
2128997 - [4.11.1]virt-launcher cannot be started on OCP 4.12 due to PodSecurity restricted:v1.24
2129013 - Mark Windows 11 as TechPreview
2129234 - Service is not deleted along with the VM when the VM is created from a template with service
2129301 - Cloud-init network data don't wipe out on uncheck checkbox 'Add network data'
2129870 - crypto-policy : Accepting TLS 1.3 connections by validating webhook
2130509 - Auto image import in failed state with data sources pointing to external manually-created PVC/DV
2130588 - crypto-policy : Common Ciphers support by apiserver and hco
2130695 - crypto-policy : Logging Improvement and publish the source of ciphers
2130909 - Non-privileged user can start DataSource creation
2131157 - KV data transfer rate chart in VM Metrics tab is not displayed
2131165 - [dark mode] Additional statuses accordion on Virtualization Overview page not visible enough
2131674 - Bump virtlogd memory requirement to 20Mi
2132031 - Ensure Windows 2022 Templates are marked as TechPreview like it is done now for Windows 11
2132682 - Default YAML entity name convention.
2132721 - Delete dialogs
2132744 - Description text is missing in Live Migrations section
2132746 - Background is broken in Virtualization Monitoring page
2132783 - VM can not be created from Template with edited boot source
2132793 - Edited Template BSR is not saved
2132932 - Typo in PVC size units menu
2133540 - [pod security violation audit] Audit violation in "cni-plugins" container should be fixed
2133541 - [pod security violation audit] Audit violation in "bridge-marker" container should be fixed
2133542 - [pod security violation audit] Audit violation in "manager" container should be fixed
2133543 - [pod security violation audit] Audit violation in "kube-rbac-proxy" container should be fixed
2133655 - [pod security violation audit] Audit violation in "cdi-operator" container should be fixed
2133656 - [4.12][pod security violation audit] Audit violation in "hostpath-provisioner-operator" container should be fixed
2133659 - [pod security violation audit] Audit violation in "cdi-controller" container should be fixed
2133660 - [pod security violation audit] Audit violation in "cdi-source-update-poller" container should be fixed
2134123 - KubeVirtComponentExceedsRequestedMemory Alert for virt-handler pod
2134672 - [e2e] add data-test-id for catalog -> storage section
2134825 - Authorization for expand-spec endpoint missing
2135805 - Windows 2022 template is missing vTPM and UEFI params in spec
2136051 - Name jumping when trying to create a VM with source from catalog
2136425 - Windows 11 is detected as Windows 10
2136534 - Not possible to specify a TTL on VMExports
2137123 - VMExport: export pod is not PSA complaint
2137241 - Checkbox about delete vm disks is not loaded while deleting VM
2137243 - registery input add docker prefix twice
2137349 - "Manage source" action infinitely loading on DataImportCron details page
2137591 - Inconsistent dialog headings/titles
2137731 - Link of VM status in overview is not working
2137733 - No link for VMs in error status in "VirtualMachine statuses" card
2137736 - The column name "MigrationPolicy name" can just be "Name"
2137896 - crypto-policy: HCO should pick TLSProfile from apiserver if not provided explicitly
2138112 - Unsupported S3 endpoint option in Add disk modal
2138119 - "Customize VirtualMachine" flow is not user-friendly because settings are split into 2 modals
2138199 - Win11 and Win22 templates are not filtered properly by Template provider
2138653 - Saving Template prameters reloads the page
2138657 - Setting DATA_SOURCE_ Template parameters makes VM creation fail
2138664 - VM that was created with SSH key fails to start
2139257 - Cannot add disk via "Using an existing PVC"
2139260 - Clone button is disabled while VM is running
2139293 - Non-admin user cannot load VM list page
2139296 - Non-admin cannot load MigrationPolicies page
2139299 - No auto-generated VM name while creating VM by non-admin user
2139306 - Non-admin cannot create VM via customize mode
2139479 - virtualization overview crashes for non-priv user
2139574 - VM name gets "emptyname" if click the create button quickly
2139651 - non-priv user can click create when have no permissions
2139687 - catalog shows template list for non-priv users
2139738 - [4.12]Can't restore cloned VM
2139820 - non-priv user cant reach vm details
2140117 - Provide upgrade path from 4.11.1->4.12.0
2140521 - Click the breadcrumb list about "VirtualMachines" goes to undefined project
2140534 - [View only] it should give a permission error when user clicking the VNC play/connect button as a view only user
2140627 - Not able to select storageClass if there is no default storageclass defined
2140730 - Links on Virtualization Overview page lead to wrong namespace for non-priv user
2140808 - Hyperv feature set to "enabled: false" prevents scheduling
2140977 - Alerts number is not correct on Virtualization overview
2140982 - The base template of cloned template is "Not available"
2140998 - Incorrect information shows in overview page per namespace
2141089 - Unable to upload boot images.
2141302 - Unhealthy states alerts and state metrics are missing
2141399 - Unable to set TLS Security profile for CDI using HCO jsonpatch annotations
2141494 - "Start in pause mode" option is not available while creating the VM
2141654 - warning log appearing on VMs: found no SR-IOV networks
2141711 - Node column selector is redundant for non-priv user
2142468 - VM action "Stop" should not be disabled when VM in pause state
2142470 - Delete a VM or template from all projects leads to 404 error
2142511 - Enhance alerts card in overview
2142647 - Error after MigrationPolicy deletion
2142891 - VM latency checkup: Failed to create the checkup's Job
2142929 - Permission denied when try get instancestypes
2143268 - Topolvm storageProfile missing accessModes and volumeMode
2143498 - Could not load template while creating VM from catalog
2143964 - Could not load template while creating VM from catalog
2144580 - "?" icon is too big in VM Template Disk tab
2144828 - "?" icon is too big in VM Template Disk tab
2144839 - Alerts number is not correct on Virtualization overview
2153849 - After upgrade to 4.11.1->4.12.0 hco.spec.workloadUpdateStrategy value is getting overwritten
2155757 - Incorrect upstream-version label "v1.6.0-unstable-410-g09ea881c" is tagged to 4.12 hyperconverged-cluster-operator-container and hyperconverged-cluster-webhook-container
- Description:
Red Hat Advanced Cluster Management for Kubernetes 2.6.0 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/release_notes/
Security fixes:
-
CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS
-
CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add
-
CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header
-
CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions
-
CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip
-
CVE-2022-30630 golang: io/fs: stack exhaustion in Glob
-
CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read
-
CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob
-
CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal
-
CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode
-
CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
Bug fixes:
-
assisted-service repo pin-latest.py script should allow custom tags to be pinned (BZ# 2065661)
-
assisted-service-build image is too big in size (BZ# 2066059)
-
assisted-service pin-latest.py script should exclude the postgres image (BZ# 2076901)
-
PXE artifacts need to be served via HTTP (BZ# 2078531)
-
Implementing new service-agent protocol on agent side (BZ# 2081281)
-
RHACM 2.6.0 images (BZ# 2090906)
-
Assisted service POD keeps crashing after a bare metal host is created (BZ# 2093503)
-
Assisted service triggers the worker nodes re-provisioning on the hub cluster when the converged flow is enabled (BZ# 2096106)
-
Fix assisted CI jobs that fail for cluster-info readiness (BZ# 2097696)
-
Nodes are required to have installation disks of at least 120GB instead of at minimum of 100GB (BZ# 2099277)
-
The pre-selected search keyword is not readable (BZ# 2107736)
-
The value of label expressions in the new placement for policy and policysets cannot be shown real-time from UI (BZ# 2111843)
-
Bugs fixed (https://bugzilla.redhat.com/):
2065661 - assisted-service repo pin-latest.py script should allow custom tags to be pinned 2066059 - assisted-service-build image is too big in size 2076901 - assisted-service pin-latest.py script should exclude the postgres image 2078531 - iPXE artifacts need to be served via HTTP 2081281 - Implementing new service-agent protocol on agent side 2090901 - Capital letters in install-config.yaml .platform.baremetal.hosts[].name cause bootkube errors 2090906 - RHACM 2.6.0 images 2092793 - CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add 2093503 - Assisted service POD keeps crashing after a bare metal host is created 2096106 - Assisted service triggers the worker nodes re-provisioning on the hub cluster when the converged flow is enabled 2096445 - Assisted service POD keeps crashing after a bare metal host is created 2096460 - Spoke BMH stuck "inspecting" when deployed via the converged workflow 2097696 - Fix assisted CI jobs that fail for cluster-info readiness 2099277 - Nodes are required to have installation disks of at least 120GB instead of at minimum of 100GB 2103703 - Automatic version upgrade triggered for oadp operator installed by cluster-backup-chart 2104117 - Spoke BMH stuck ?available? after changing a BIOS attribute via the converged workflow 2104984 - Infrastructure operator missing clusterrole permissions for interacting with mutatingwebhookconfigurations 2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS 2105339 - Search Application button on the Application Table for Subscription applications does not Redirect 2105357 - [UI] hypershift cluster creation error - n[0] is undefined 2106347 - Submariner error looking up service account submariner-operator/submariner-addon-sa 2106882 - Security Context Restrictions are restricting creation of some pods which affects the deployment of some applications 2107049 - The clusterrole for global clusterset did not created by default 2107065 - governance-policy-framework in CrashLoopBackOff state on spoke cluster: Failed to start manager {"error": "error listening on :8081: listen tcp :8081: bind: address already in use"} 2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read 2107370 - Helm Release resource recreation feature does not work with the local cluster 2107371 - CVE-2022-30630 golang: io/fs: stack exhaustion in Glob 2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header 2107376 - CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions 2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working 2107386 - CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob 2107388 - CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode 2107390 - CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip 2107392 - CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal 2108888 - Hypershift on AWS - control plane not running 2109370 - The button to create the cluster is not visible 2111203 - Add ocp 4.11 to filters for discovering clusters in ACM 2.6 2111218 - Create cluster - Infrastructure page crashes 2111651 - "View application" button on app table for Flux applications redirects to apiVersion=ocp instead of flux 2111663 - Hosted cluster in Pending import state 2111671 - Leaked namespaces after deleting hypershift deployment 2111770 - [ACM 2.6] there is no node info for remote cluster in multiple hubs 2111843 - The value of label expressions in the new placement for policy and policysets cannot be shown real-time from UI 2112180 - The policy page is crashed after input keywords in the search box 2112281 - config-policy-controller pod can't startup in the OCP3.11 managed cluster 2112318 - Can't delete the objects which are re-created by policy when deleting the policy 2112321 - BMAC reconcile loop never stops after changes 2112426 - No cluster discovered due to x509: certificate signed by unknown authority 2112478 - Value of delayAfterRunSeconds is not shown on the final submit panel and the word itself should not be wrapped. 2112793 - Can't view details of the policy template when set the spec.pruneObjectBehavior as unsupported value 2112803 - ClusterServiceVersion for release 2.6 branch references "latest" tag 2113787 - [ACM 2.6] can not delete namespaces after detaching the hosted cluster 2113838 - the cluster proxy-agent was deployed on the non-infra nodes 2113842 - [ACM 2.6] must restart hosting cluster registration pod if update work-manager-addon cr to change installNamespace 2114982 - Control plane type shows 'Standalone' for hypershift cluster 2115622 - Hub fromsecret function doesn't work for hosted mode in multiple hub 2115723 - Can't view details of the policy template for customer and hypershift cluster in hosted mode from UI 2115993 - Policy automation details panel was not updated after editing the mode back to disabled 2116211 - Count of violations with unknown status was not accurate when managed clusters have mixed status 2116329 - cluster-proxy-agent not startup due to the imagepullbackoff on spoke cluster 2117113 - The proxy-server-host was not correct in cluster-proxy-agent 2117187 - pruneObjectBehavior radio selection cannot work well and always switch the first one template in multiple configurationPolicy templates 2117480 - [ACM 2.6] infra-id of HypershiftDeployment doesn't work 2118338 - Report the "namespace not found" error after clicked view yaml link of a policy in the multiple hub env 2119326 - Can't view details of the SecurityContextConstraints policy for managed clusters from UI
- Bugs fixed (https://bugzilla.redhat.com/):
2064698 - CVE-2020-36518 jackson-databind: denial of service via a large depth of nested objects 2135244 - CVE-2022-42003 jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS 2135247 - CVE-2022-42004 jackson-databind: use of deeply nested arrays
- JIRA issues fixed (https://issues.jboss.org/):
LOG-3293 - log-file-metric-exporter container has not limits exhausting the resources of the node
-
To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html
-
Solution:
For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html
You may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.
The sha values for the release are
(For x86_64 architecture) The image digest is sha256:c6771b12bd873c0e3e5fbc7afa600d92079de6534dcb52f09cb1d22ee49608a9
(For s390x architecture) The image digest is sha256:622b5361f95d1d512ea84f363ac06155cbb9ee28e85ccaae1acd80b98b660fa8
(For ppc64le architecture) The image digest is sha256:50c131cf85dfb00f258af350a46b85eff8fb8084d3e1617520cd69b59caeaff7
(For aarch64 architecture) The image digest is sha256:9e575c4ece9caaf31acbef246ccad71959cd5bf634e7cb284b0849ddfa205ad7
All OpenShift Container Platform 4.11 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html
- Bugs fixed (https://bugzilla.redhat.com/):
2215317 - CVE-2022-21235 github.com/Masterminds/vcs: Command Injection via argument injection
- JIRA issues fixed (https://issues.redhat.com/):
OCPBUGS-15446 - (release-4.11) gather "gateway-mode-config" config map from "openshift-network-operator" namespace OCPBUGS-15532 - visiting Configurations page returns error Cannot read properties of undefined (reading 'apiGroup') OCPBUGS-15645 - Can't use git lfs in BuildConfig git source with strategy Docker OCPBUGS-15739 - Environment cannot find Python OCPBUGS-15758 - [release-4.11] Bump Jenkins and Jenkins Agent Base image versions OCPBUGS-15942 - 9% of OKD tests failing on error: tag latest failed: Internal error occurred: registry.centos.org/dotnet/dotnet-31-centos7:latest: Get "https://registry.centos.org/v2/": dial tcp: lookup registry.centos.org on 172.30.0.10:53: no such host OCPBUGS-15966 - [4.12] MetalLB contains incorrect data Correct and incorrect MetalLB resources coexist should have correct statuses
6
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-1990", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "vim", scope: "lt", trust: 1, vendor: "vim", version: "8.2.5037", }, { model: "macos", scope: "lt", trust: 1, vendor: "apple", version: "13.0", }, { model: "fedora", scope: "eq", trust: 1, vendor: "fedoraproject", version: "34", }, { model: "fedora", scope: "eq", trust: 1, vendor: "fedoraproject", version: "36", }, { model: "fedora", scope: "eq", trust: 1, vendor: "fedoraproject", version: "35", }, { model: "fedora", scope: null, trust: 0.8, vendor: "fedora", version: null, }, { model: "vim", scope: null, trust: 0.8, vendor: "vim", version: null, }, { model: "macos", scope: null, trust: 0.8, vendor: "アップル", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2022-011219", }, { db: "NVD", id: "CVE-2022-1927", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Red Hat", sources: [ { db: "PACKETSTORM", id: "168150", }, { db: "PACKETSTORM", id: "168222", }, { db: "PACKETSTORM", id: "168112", }, { db: "PACKETSTORM", id: "168284", }, { db: "PACKETSTORM", id: "170741", }, { db: "PACKETSTORM", id: "168287", }, { db: "PACKETSTORM", id: "170179", }, { db: "PACKETSTORM", id: "173605", }, ], trust: 0.8, }, cve: "CVE-2022-1927", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 8.6, id: "CVE-2022-1927", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 1.8, vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 8.6, id: "VHN-423615", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:M/AU:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "security@huntr.dev", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, id: "CVE-2022-1927", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1.8, userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, { attackComplexity: "LOW", attackVector: "LOCAL", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, id: "CVE-2022-1927", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2022-1927", trust: 1, value: "HIGH", }, { author: "security@huntr.dev", id: "CVE-2022-1927", trust: 1, value: "HIGH", }, { author: "NVD", id: "CVE-2022-1927", trust: 0.8, value: "High", }, { author: "VULHUB", id: "VHN-423615", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-423615", }, { db: "JVNDB", id: "JVNDB-2022-011219", }, { db: "NVD", id: "CVE-2022-1927", }, { db: "NVD", id: "CVE-2022-1927", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Buffer Over-read in GitHub repository vim/vim prior to 8.2. vim/vim Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Vim is a cross-platform text editor. Vim versions prior to 8.2 have a security vulnerability caused by buffer overreading. Summary:\n\nUpdated images that include numerous enhancements, security, and bug fixes\nare now available for Red Hat OpenShift Data Foundation 4.11.0 on Red Hat\nEnterprise Linux 8. Description:\n\nRed Hat OpenShift Data Foundation is software-defined storage integrated\nwith and optimized for the Red Hat OpenShift Container Platform. Red Hat\nOpenShift Data Foundation is a highly scalable, production-grade persistent\nstorage for stateful applications running in the Red Hat OpenShift\nContainer Platform. In addition to persistent storage, Red Hat OpenShift\nData Foundation provisions a multicloud data management service with an S3\ncompatible API. \n\nSecurity Fix(es):\n\n* eventsource: Exposure of Sensitive Information (CVE-2022-1650)\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\n* nodejs-set-value: type confusion allows bypass of CVE-2019-10747\n(CVE-2021-23440)\n\n* nanoid: Information disclosure via valueOf() function (CVE-2021-23566)\n\n* node-fetch: exposure of sensitive information to an unauthorized actor\n(CVE-2022-0235)\n\n* follow-redirects: Exposure of Sensitive Information via Authorization\nHeader leak (CVE-2022-0536)\n\n* prometheus/client_golang: Denial of service using\nInstrumentHandlerCounter (CVE-2022-21698)\n\n* golang: math/big: uncontrolled memory consumption due to an unhandled\noverflow via Rat.SetString (CVE-2022-23772)\n\n* golang: cmd/go: misinterpretation of branch names can lead to incorrect\naccess control (CVE-2022-23773)\n\n* golang: crypto/elliptic: IsOnCurve returns true for invalid field\nelements (CVE-2022-23806)\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* node-forge: Signature verification leniency in checking `digestAlgorithm`\nstructure can lead to signature forgery (CVE-2022-24771)\n\n* node-forge: Signature verification failing to check tailing garbage bytes\ncan lead to signature forgery (CVE-2022-24772)\n\n* node-forge: Signature verification leniency in checking `DigestInfo`\nstructure (CVE-2022-24773)\n\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n\n* golang: regexp: stack exhaustion via a deeply nested expression\n(CVE-2022-24921)\n\n* golang: crypto/elliptic: panic caused by oversized scalar\n(CVE-2022-28327)\n\n* golang: syscall: faccessat checks wrong group (CVE-2022-29526)\n\n* go-getter: writes SSH credentials into logfile, exposing sensitive\ncredentials to local uses (CVE-2022-29810)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\nThese updated images include numerous enhancements and bug fixes. Space\nprecludes documenting all of these changes in this advisory. Users are\ndirected to the Red Hat OpenShift Data Foundation Release Notes for\ninformation on the most significant of these changes:\n\nhttps://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.11/html/4.11_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to these\nupdated images, which provide numerous bug fixes and enhancements. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):\n\n1937117 - Deletion of StorageCluster doesn't remove ceph toolbox pod\n1947482 - The device replacement process when deleting the volume metadata need to be fixed or modified\n1973317 - libceph: read_partial_message and bad crc/signature errors\n1996829 - Permissions assigned to ceph auth principals when using external storage are too broad\n2004944 - CVE-2021-23440 nodejs-set-value: type confusion allows bypass of CVE-2019-10747\n2027724 - Warning log for rook-ceph-toolbox in ocs-operator log\n2029298 - [GSS] Noobaa is not compatible with aws bucket lifecycle rule creation policies\n2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor\n2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter\n2047173 - [RFE] Change controller-manager pod name in odf-lvm-operator to more relevant name to lvm\n2050853 - CVE-2021-23566 nanoid: Information disclosure via valueOf() function\n2050897 - CVE-2022-0235 mcg-core-container: node-fetch: exposure of sensitive information to an unauthorized actor [openshift-data-foundation-4]\n2053259 - CVE-2022-0536 follow-redirects: Exposure of Sensitive Information via Authorization Header leak\n2053429 - CVE-2022-23806 golang: crypto/elliptic: IsOnCurve returns true for invalid field elements\n2053532 - CVE-2022-23772 golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString\n2053541 - CVE-2022-23773 golang: cmd/go: misinterpretation of branch names can lead to incorrect access control\n2056697 - odf-csi-addons-operator subscription failed while using custom catalog source\n2058211 - Add validation for CIDR field in DRPolicy\n2060487 - [ODF to ODF MS] Consumer lost connection to provider API if the endpoint node is powered off/replaced\n2060790 - ODF under Storage missing for OCP 4.11 + ODF 4.10\n2061713 - [KMS] The error message during creation of encrypted PVC mentions the parameter in UPPER_CASE\n2063691 - [GSS] [RFE] Add termination policy to s3 route\n2064426 - [GSS][External Mode] exporter python script does not support FQDN for RGW endpoint\n2064857 - CVE-2022-24921 golang: regexp: stack exhaustion via a deeply nested expression\n2066514 - OCS operator to install Ceph prometheus alerts instead of Rook\n2067079 - [GSS] [RFE] Add termination policy to ocs-storagecluster-cephobjectstore route\n2067387 - CVE-2022-24771 node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery\n2067458 - CVE-2022-24772 node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery\n2067461 - CVE-2022-24773 node-forge: Signature verification leniency in checking `DigestInfo` structure\n2069314 - OCS external mode should allow specifying names for all Ceph auth principals\n2069319 - [RFE] OCS CephFS External Mode Multi-tenancy. Add cephfs subvolumegroup and path= caps per cluster. \n2069812 - must-gather: rbd_vol_and_snap_info collection is broken\n2069815 - must-gather: essential rbd mirror command outputs aren't collected\n2070542 - After creating a new storage system it redirects to 404 error page instead of the \"StorageSystems\" page for OCP 4.11\n2071494 - [DR] Applications are not getting deployed\n2072009 - CVE-2022-24785 Moment.js: Path traversal in moment.locale\n2073920 - rook osd prepare failed with this error - failed to set kek as an environment variable: key encryption key is empty\n2074810 - [Tracker for Bug 2074585] MCG standalone deployment page goes blank when the KMS option is enabled\n2075426 - 4.10 must gather is not available after GA of 4.10\n2075581 - [IBM Z] : ODF 4.11.0-38 deployment leaves the storagecluster in \"Progressing\" state although all the openshift-storage pods are up and Running\n2076457 - After node replacement[provider], connection issue between consumer and provider if the provider node which was referenced MON-endpoint configmap (on consumer) is lost\n2077242 - vg-manager missing permissions\n2077688 - CVE-2022-24675 golang: encoding/pem: fix stack overflow in Decode\n2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar\n2079866 - [DR] odf-multicluster-console is in CLBO state\n2079873 - csi-nfsplugin pods are not coming up after successful patch request to update \"ROOK_CSI_ENABLE_NFS\": \"true\"'\n2080279 - CVE-2022-29810 go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses\n2081680 - Add the LVM Operator into the Storage category in OperatorHub\n2082028 - UI does not have the option to configure capacity, security and networks,etc. during storagesystem creation\n2082078 - OBC's not getting created on primary cluster when manageds3 set as \"true\" for mirrorPeer\n2082497 - Do not filter out removable devices\n2083074 - [Tracker for Ceph BZ #2086419] Two Ceph mons crashed in ceph-16.2.7/src/mon/PaxosService.cc: 193: FAILED ceph_assert(have_pending)\n2083441 - LVM operator should deploy the volumesnapshotclass resource\n2083953 - [Tracker for Ceph BZ #2084579] PVC created with ocs-storagecluster-ceph-nfs storageclass is moving to pending status\n2083993 - Add missing pieces for storageclassclaim\n2084041 - [Console Migration] Link-able storage system name directs to blank page\n2084085 - CVE-2022-29526 golang: syscall: faccessat checks wrong group\n2084201 - MCG operator pod is stuck in a CrashLoopBackOff; Panic Attack: [] an empty namespace may not be set when a resource name is provided\"\n2084503 - CLI falsely flags unique PVPool backingstore secrets as duplicates\n2084546 - [Console Migration] Provider details absent under backing store in UI\n2084565 - [Console Migration] The creation of new backing store , directs to a blank page\n2085307 - CVE-2022-1650 eventsource: Exposure of Sensitive Information\n2085351 - [DR] Mirrorpeer failed to create with msg Internal error occurred\n2085357 - [DR] When drpolicy is create drcluster resources are getting created under default namespace\n2086557 - Thin pool in lvm operator doesn't use all disks\n2086675 - [UI]No option to \"add capacity\" via the Installed Operators tab\n2086982 - ODF 4.11 deployment is failing\n2086983 - [odf-clone] Mons IP not updated correctly in the rook-ceph-mon-endpoints cm\n2087078 - [RDR] [UI] Multiple instances of Object Bucket, Object Bucket Claims and 'Overview' tab is present under Storage section on the Hub cluster when navigated back from the Managed cluster using the Hybrid console dropdown\n2087107 - Set default storage class if none is set\n2087237 - [UI] After clicking on Create StorageSystem, it navigates to Storage Systems tab but shows an error message\n2087675 - ocs-metrics-exporter pod crashes on odf v4.11\n2087732 - [Console Migration] Events page missing under new namespace store\n2087755 - [Console Migration] Bucket Class details page doesn't have the complete details in UI\n2088359 - Send VG Metrics even if storage is being consumed from thinPool alone\n2088380 - KMS using vault on standalone MCG cluster is not enabled\n2088506 - ceph-external-cluster-details-exporter.py should not accept hostname for rgw-endpoint\n2088587 - Removal of external storage system with misconfigured cephobjectstore fails on noobaa webhook\n2089296 - [MS v2] Storage cluster in error phase and 'ocs-provider-qe' addon installation failed with ODF 4.10.2\n2089342 - prometheus pod goes into OOMKilled state during ocs-osd-controller-manager pod restarts\n2089397 - [GSS]OSD pods CLBO after upgrade to 4.10 from 4.9. \n2089552 - [MS v2] Cannot create StorageClassClaim\n2089567 - [Console Migration] Improve the styling of Various Components\n2089786 - [Console Migration] \"Attach to deployment\" option is missing in kebab menu for Object Bucket Claims . \n2089795 - [Console Migration] Yaml and Events page is missing for Object Bucket Claims and Object Bucket. \n2089797 - [RDR] rbd image failed to mount with msg rbd error output: rbd: sysfs write failed\n2090278 - [LVMO] Some containers are missing resource requirements and limits\n2090314 - [LVMO] CSV is missing some useful annotations\n2090953 - [MCO] DRCluster created under default namespace\n2091487 - [Hybrid Console] Multicluster dashboard is not displaying any metrics\n2091638 - [Console Migration] Yaml page is missing for existing and newly created Block pool. \n2091641 - MCG operator pod is stuck in a CrashLoopBackOff; MapSecretToNamespaceStores invalid memory address or nil pointer dereference\n2091681 - Auto replication policy type detection is not happneing on DRPolicy creation page when ceph cluster is external\n2091894 - All backingstores in cluster spontaneously change their own secret\n2091951 - [GSS] OCS pods are restarting due to liveness probe failure\n2091998 - Volume Snapshots not work with external restricted mode\n2092143 - Deleting a CephBlockPool CR does not delete the underlying Ceph pool\n2092217 - [External] UI for uploding JSON data for external cluster connection has some strict checks\n2092220 - [Tracker for Ceph BZ #2096882] CephNFS is not reaching to Ready state on ODF on IBM Power (ppc64le)\n2092349 - Enable zeroing on the thin-pool during creation\n2092372 - [MS v2] StorageClassClaim is not reaching Ready Phase\n2092400 - [MS v2] StorageClassClaim creation is failing with error \"no StorageCluster found\"\n2093266 - [RDR] When mirroring is enabled rbd mirror daemon restart config should be enabled automatically\n2093848 - Note about token for encrypted PVCs should be removed when only cluster wide encryption checkbox is selected\n2094179 - MCO fails to create DRClusters when replication mode is synchronous\n2094853 - [Console Migration] Description under storage class drop down in add capacity is missing . \n2094856 - [KMS] PVC creation using vaulttenantsa method is failing due to token secret missing in serviceaccount\n2095155 - Use tool `black` to format the python external script\n2096209 - ReclaimSpaceJob fails on OCP 4.11 + ODF 4.10 cluster\n2096414 - Compression status for cephblockpool is reported as Enabled and Disabled at the same time\n2096509 - [Console Migration] Unable to select Storage Class in Object Bucket Claim creation page\n2096513 - Infinite BlockPool tabs get created when the StorageSystem details page is opened\n2096823 - After upgrading the cluster from ODF4.10 to ODF4.11, the ROOK_CSI_ENABLE_CEPHFS move to False\n2096937 - Storage - Data Foundation: i18n misses\n2097216 - Collect StorageClassClaim details in must-gather\n2097287 - [UI] Dropdown doesn't close on it's own after arbiter zone selection on 'Capacity and nodes' page\n2097305 - Add translations for ODF 4.11\n2098121 - Managed ODF not getting detected\n2098261 - Remove BlockPools(no use case) and Object(redundat with Overview) tab on the storagesystem page for NooBaa only and remove BlockPools tab for External mode deployment\n2098536 - [KMS] PVC creation using vaulttenantsa method is failing due to token secret missing in serviceaccount\n2099265 - [KMS] The storagesystem creation page goes blank when KMS is enabled\n2099581 - StorageClassClaim with encryption gets into Failed state\n2099609 - The red-hat-storage/topolvm release-4.11 needs to be synced with the upstream project\n2099646 - Block pool list page kebab action menu is showing empty options\n2099660 - OCS dashbaords not appearing unless user clicks on \"Overview\" Tab\n2099724 - S3 secret namespace on the managed cluster doesn't match with the namespace in the s3profile\n2099965 - rbd: provide option to disable setting metadata on RBD images\n2100326 - [ODF to ODF] Volume snapshot creation failed\n2100352 - Make lvmo pod labels more uniform\n2100946 - Avoid temporary ceph health alert for new clusters where the insecure global id is allowed longer than necessary\n2101139 - [Tracker for OCP BZ #2102782] topolvm-controller get into CrashLoopBackOff few minutes after install\n2101380 - Default backingstore is rejected with message INVALID_SCHEMA_PARAMS SERVER account_api#/methods/check_external_connection\n2103818 - Restored snapshot don't have any content\n2104833 - Need to update configmap for IBM storage odf operator GA\n2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS\n\n5. Solution:\n\nThe OpenShift Service Mesh Release Notes provide information on the\nfeatures and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n2107371 - CVE-2022-30630 golang: io/fs: stack exhaustion in Glob\n2107376 - CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions\n2107386 - CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob\n2107388 - CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode\n2107390 - CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip\n2107392 - CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nOSSM-1105 - IOR doesn't support a host with namespace/ prefix\nOSSM-1205 - Specifying logging parameter will make istio-ingressgateway and istio-egressgateway failed to start\nOSSM-1668 - [Regression] jwksResolverCA field in SMCP is missing\nOSSM-1718 - Istio Operator pauses reconciliation when gateway deployed to non-control plane namespace\nOSSM-1775 - [Regression] Incorrect 3scale image specified for 2.0 control planes\nOSSM-1800 - IOR should copy labels from Gateway to Route\nOSSM-1805 - Reconcile SMCP when Kiali is not available\nOSSM-1846 - SMCP fails to reconcile when enabling PILOT_ENABLE_GATEWAY_API_DEPLOYMENT_CONTROLLER\nOSSM-1868 - Container release for Maistra 2.2.2\n\n6. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: Logging Subsystem 5.5.0 - Red Hat OpenShift security update\nAdvisory ID: RHSA-2022:6051-01\nProduct: RHOL\nAdvisory URL: https://access.redhat.com/errata/RHSA-2022:6051\nIssue date: 2022-08-18\nCVE Names: CVE-2021-38561 CVE-2022-0759 CVE-2022-1012\n CVE-2022-1292 CVE-2022-1586 CVE-2022-1785\n CVE-2022-1897 CVE-2022-1927 CVE-2022-2068\n CVE-2022-2097 CVE-2022-21698 CVE-2022-30631\n CVE-2022-32250\n====================================================================\n1. Summary:\n\nAn update is now available for RHOL-5.5-RHEL-8. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Description:\n\nLogging Subsystem 5.5.0 - Red Hat OpenShift\n\nSecurity Fix(es):\n\n* kubeclient: kubeconfig parsing error can lead to MITM attacks\n(CVE-2022-0759)\n\n* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\n\n* golang: out-of-bounds read in golang.org/x/text/language leads to DoS\n(CVE-2021-38561)\n\n* prometheus/client_golang: Denial of service using\nInstrumentHandlerCounter (CVE-2022-21698)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n3. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter\n2058404 - CVE-2022-0759 kubeclient: kubeconfig parsing error can lead to MITM attacks\n2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS\n2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nLOG-1415 - Allow users to tune fluentd\nLOG-1539 - Events and CLO csv are not collected after running `oc adm must-gather --image=$downstream-clo-image `\nLOG-1713 - Reduce Permissions granted for prometheus-k8s service account\nLOG-2063 - Collector pods fail to start when a Vector only Cluster Logging instance is created. \nLOG-2134 - The infra logs are sent to app-xx indices\nLOG-2159 - Cluster Logging Pods in CrashLoopBackOff\nLOG-2165 - [Vector] Default log level debug makes it hard to find useful error/failure messages. \nLOG-2167 - [Vector] Collector pods fails to start with configuration error when using Kafka SASL over SSL\nLOG-2169 - [Vector] Logs not being sent to Kafka with SASL plaintext. \nLOG-2172 - [vector]The openshift-apiserver and ovn audit logs can not be collected. \nLOG-2242 - Log file metric exporter is still following /var/log/containers files. \nLOG-2243 - grafana-dashboard-cluster-logging should be deleted once clusterlogging/instance was removed\nLOG-2264 - Logging link should contain an icon\nLOG-2274 - [Logging 5.5] EO doesn't recreate secrets kibana and kibana-proxy after removing them. \nLOG-2276 - Fluent config format is hard to read via configmap\nLOG-2290 - ClusterLogging Instance status in not getting updated in UI\nLOG-2291 - [release-5.5] Events listing out of order in Kibana 6.8.1\nLOG-2294 - [Vector] Vector internal metrics are not exposed via HTTPS due to which OpenShift Monitoring Prometheus service cannot scrape the metrics endpoint. \nLOG-2300 - [Logging 5.5]ES pods can't be ready after removing secret/signing-elasticsearch\nLOG-2303 - [Logging 5.5] Elasticsearch cluster upgrade stuck\nLOG-2308 - configmap grafana-dashboard-elasticsearch is being created and deleted continously\nLOG-2333 - Journal logs not reaching Elasticsearch output\nLOG-2337 - [Vector] Missing @ prefix from the timestamp field in log record. \nLOG-2342 - [Logging 5.5] Kibana pod can't connect to ES cluster after removing secret/signing-elasticsearch: \"x509: certificate signed by unknown authority\"\nLOG-2384 - Provide a method to get authenticated from GCP\nLOG-2411 - [Vector] Audit logs forwarding not working. \nLOG-2412 - CLO's loki output url is parsed wrongly\nLOG-2413 - PriorityClass cluster-logging is deleted if provide an invalid log type\nLOG-2418 - EO supported time units don't match the units specified in CRDs. \nLOG-2439 - Telemetry: the managedStatus&healthStatus&version values are wrong\nLOG-2440 - [loki-operator] Live tail of logs does not work on OpenShift\nLOG-2444 - The write index is removed when `the size of the index` > `diskThresholdPercent% * total size`. \nLOG-2460 - [Vector] Collector pods fail to start on a FIPS enabled cluster. \nLOG-2461 - [Vector] Vector auth config not generated when user provided bearer token is used in a secret for connecting to LokiStack. \nLOG-2463 - Elasticsearch operator repeatedly prints error message when checking indices\nLOG-2474 - EO shouldn't grant cluster-wide permission to system:serviceaccount:openshift-monitoring:prometheus-k8s when ES cluster is deployed. [openshift-logging 5.5]\nLOG-2522 - CLO supported time units don't match the units specified in CRDs. \nLOG-2525 - The container's logs are not sent to separate index if the annotation is added after the pod is ready. \nLOG-2546 - TLS handshake error on loki-gateway for FIPS cluster\nLOG-2549 - [Vector] [master] Journald logs not sent to the Log store when using Vector as collector. \nLOG-2554 - [Vector] [master] Fallback index is not used when structuredTypeKey is missing from JSON log data\nLOG-2588 - FluentdQueueLengthIncreasing rule failing to be evaluated. \nLOG-2596 - [vector]the condition in [transforms.route_container_logs] is inaccurate\nLOG-2599 - Supported values for level field don't match documentation\nLOG-2605 - $labels.instance is empty in the message when firing FluentdNodeDown alert\nLOG-2609 - fluentd and vector are unable to ship logs to elasticsearch when cluster-wide proxy is in effect\nLOG-2619 - containers violate PodSecurity -- Log Exporation\nLOG-2627 - containers violate PodSecurity -- Loki\nLOG-2649 - Level Critical should match the beginning of the line as the other levels\nLOG-2656 - Logging uses deprecated v1beta1 apis\nLOG-2664 - Deprecated Feature logs causing too much noise\nLOG-2665 - [Logging 5.5] Sometimes collector fails to push logs to Elasticsearch cluster\nLOG-2693 - Integration with Jaeger fails for ServiceMonitor\nLOG-2700 - [Vector] vector container can't start due to \"unknown field `pod_annotation_fields`\" . \nLOG-2703 - Collector DaemonSet is not removed when CLF is deleted for fluentd/vector only CL instance\nLOG-2725 - Upgrade logging-eventrouter Golang version and tags\nLOG-2731 - CLO keeps reporting `Reconcile ServiceMonitor retry error` and `Reconcile Service retry error` after creating clusterlogging. \nLOG-2732 - Prometheus Operator pod throws 'skipping servicemonitor' error on Jaeger integration\nLOG-2742 - unrecognized outputs when use the sts role secret\nLOG-2746 - CloudWatch forwarding rejecting large log events, fills tmpfs\nLOG-2749 - OpenShift Logging Dashboard for Elastic Shards shows \"active_primary\" instead of \"active\" shards. \nLOG-2753 - Update Grafana configuration for LokiStack integration on grafana/loki repo\nLOG-2763 - [Vector]{Master} Vector's healthcheck fails when forwarding logs to Lokistack. \nLOG-2764 - ElasticSearch operator does not respect referencePolicy when selecting oauth-proxy image\nLOG-2765 - ingester pod can not be started in IPv6 cluster\nLOG-2766 - [vector] failed to parse cluster url: invalid authority IPv6 http-proxy\nLOG-2772 - arn validation failed when role_arn=arn:aws-us-gov:xxx\nLOG-2773 - No cluster-logging-operator-metrics service in logging 5.5\nLOG-2778 - [Vector] [OCP 4.11] SA token not added to Vector config when connecting to LokiStack instance without CLF creds secret required by LokiStack. \nLOG-2784 - Japanese log messages are garbled at Kibana\nLOG-2793 - [Vector] OVN audit logs are missing the level field. \nLOG-2864 - [vector] Can not sent logs to default when loki is the default output in CLF\nLOG-2867 - [fluentd] All logs are sent to application tenant when loki is used as default logstore in CLF. \nLOG-2873 - [Vector] Cannot configure CPU/Memory requests/limits when using Vector as collector. \nLOG-2875 - Seeing a black rectangle box on the graph in Logs view\nLOG-2876 - The link to the 'Container details' page on the 'Logs' screen throws error\nLOG-2877 - When there is no query entered, seeing error message on the Logs view\nLOG-2882 - RefreshIntervalDropdown and TimeRangeDropdown always set back to its original values when switching between pages in 'Logs' screen\n\n6. References:\n\nhttps://access.redhat.com/security/cve/CVE-2021-38561\nhttps://access.redhat.com/security/cve/CVE-2022-0759\nhttps://access.redhat.com/security/cve/CVE-2022-1012\nhttps://access.redhat.com/security/cve/CVE-2022-1292\nhttps://access.redhat.com/security/cve/CVE-2022-1586\nhttps://access.redhat.com/security/cve/CVE-2022-1785\nhttps://access.redhat.com/security/cve/CVE-2022-1897\nhttps://access.redhat.com/security/cve/CVE-2022-1927\nhttps://access.redhat.com/security/cve/CVE-2022-2068\nhttps://access.redhat.com/security/cve/CVE-2022-2097\nhttps://access.redhat.com/security/cve/CVE-2022-21698\nhttps://access.redhat.com/security/cve/CVE-2022-30631\nhttps://access.redhat.com/security/cve/CVE-2022-32250\nhttps://access.redhat.com/security/updates/classification/#important\n\n7. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2022 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\neIFVKOxx310=ynB/\n-----END PGP SIGNATURE-----\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. Bugs fixed (https://bugzilla.redhat.com/):\n\n2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read\n2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header\n2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working\n\n5. \n\nRHEL-8-CNV-4.12\n\n=============\nbridge-marker-container-v4.12.0-24\ncluster-network-addons-operator-container-v4.12.0-24\ncnv-containernetworking-plugins-container-v4.12.0-24\ncnv-must-gather-container-v4.12.0-58\nhco-bundle-registry-container-v4.12.0-769\nhostpath-csi-driver-container-v4.12.0-30\nhostpath-provisioner-container-v4.12.0-30\nhostpath-provisioner-operator-container-v4.12.0-31\nhyperconverged-cluster-operator-container-v4.12.0-96\nhyperconverged-cluster-webhook-container-v4.12.0-96\nkubemacpool-container-v4.12.0-24\nkubevirt-console-plugin-container-v4.12.0-182\nkubevirt-ssp-operator-container-v4.12.0-64\nkubevirt-tekton-tasks-cleanup-vm-container-v4.12.0-55\nkubevirt-tekton-tasks-copy-template-container-v4.12.0-55\nkubevirt-tekton-tasks-create-datavolume-container-v4.12.0-55\nkubevirt-tekton-tasks-create-vm-from-template-container-v4.12.0-55\nkubevirt-tekton-tasks-disk-virt-customize-container-v4.12.0-55\nkubevirt-tekton-tasks-disk-virt-sysprep-container-v4.12.0-55\nkubevirt-tekton-tasks-modify-vm-template-container-v4.12.0-55\nkubevirt-tekton-tasks-operator-container-v4.12.0-40\nkubevirt-tekton-tasks-wait-for-vmi-status-container-v4.12.0-55\nkubevirt-template-validator-container-v4.12.0-32\nlibguestfs-tools-container-v4.12.0-255\novs-cni-marker-container-v4.12.0-24\novs-cni-plugin-container-v4.12.0-24\nvirt-api-container-v4.12.0-255\nvirt-artifacts-server-container-v4.12.0-255\nvirt-cdi-apiserver-container-v4.12.0-72\nvirt-cdi-cloner-container-v4.12.0-72\nvirt-cdi-controller-container-v4.12.0-72\nvirt-cdi-importer-container-v4.12.0-72\nvirt-cdi-operator-container-v4.12.0-72\nvirt-cdi-uploadproxy-container-v4.12.0-71\nvirt-cdi-uploadserver-container-v4.12.0-72\nvirt-controller-container-v4.12.0-255\nvirt-exportproxy-container-v4.12.0-255\nvirt-exportserver-container-v4.12.0-255\nvirt-handler-container-v4.12.0-255\nvirt-launcher-container-v4.12.0-255\nvirt-operator-container-v4.12.0-255\nvirtio-win-container-v4.12.0-10\nvm-network-latency-checkup-container-v4.12.0-89\n\n3. Bugs fixed (https://bugzilla.redhat.com/):\n\n1719190 - Unable to cancel live-migration if virt-launcher pod in pending state\n2023393 - [CNV] [UI]Additional information needed for cloning when default storageclass in not defined in target datavolume\n2030801 - CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache\n2030806 - CVE-2021-44717 golang: syscall: don't close fd 0 on ForkExec error\n2040377 - Unable to delete failed VMIM after VM deleted\n2046298 - mdevs not configured with drivers installed, if mdev config added to HCO CR before drivers are installed\n2052556 - Metric \"kubevirt_num_virt_handlers_by_node_running_virt_launcher\" reporting incorrect value\n2053429 - CVE-2022-23806 golang: crypto/elliptic: IsOnCurve returns true for invalid field elements\n2053532 - CVE-2022-23772 golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString\n2053541 - CVE-2022-23773 golang: cmd/go: misinterpretation of branch names can lead to incorrect access control\n2060499 - [RFE] Cannot add additional service (or other objects) to VM template\n2069098 - Large scale |VMs migration is slow due to low migration parallelism\n2070366 - VM Snapshot Restore hangs indefinitely when backed by a snapshotclass\n2071491 - Storage Throughput metrics are incorrect in Overview\n2072797 - Metrics in Virtualization -> Overview period is not clear or configurable\n2072821 - Top Consumers of Storage Traffic in Kubevirt Dashboard giving unexpected numbers\n2079916 - KubeVirt CR seems to be in DeploymentInProgress state and not recovering\n2084085 - CVE-2022-29526 golang: syscall: faccessat checks wrong group\n2086285 - [dark mode] VirtualMachine - in the Utilization card the percentages and the graphs not visible enough in dark mode\n2086551 - Min CPU feature found in labels\n2087724 - Default template show no boot source even there are auto-upload boot sources\n2088129 - [SSP] webhook does not comply with restricted security context\n2088464 - [CDI] cdi-deployment does not comply with restricted security context\n2089391 - Import gzipped raw file causes image to be downloaded and uncompressed to TMPDIR\n2089744 - HCO should label its control plane namespace to admit pods at privileged security level\n2089751 - 4.12.0 containers\n2089804 - 4.12.0 rpms\n2091856 - ?Edit BootSource? action should have more explicit information when disabled\n2092793 - CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add\n2092796 - [RFE] CPU|Memory display in the template card is not consistent with the display in the template drawer\n2093771 - The disk source should be PVC if the template has no auto-update boot source\n2093996 - kubectl get vmi API should always return primary interface if exist\n2094202 - Cloud-init username field should have hint\n2096285 - KubeVirt CR API documentation is missing docs for many fields\n2096780 - [RFE] Add ssh-key and sysprep to template scripts tab\n2097436 - Online disk expansion ignores filesystem overhead change\n2097586 - AccessMode should stay on ReadWriteOnce while editing a disk with storage class HPP\n2099556 - [RFE] Add option to enable RDP service for windows vm\n2099573 - [RFE] Improve template's message about not editable\n2099923 - [RFE] Merge \"SSH access\" and \"SSH command\" into one\n2100290 - Error is not dismissed on catalog review page\n2100436 - VM list filtering ignores VMs in error-states\n2100442 - [RFE] allow enabling and disabling SSH service while VM is shut down\n2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS\n2100629 - Update nested support KBASE article\n2100679 - The number of hardware devices is not correct in vm overview tab\n2100682 - All hardware devices get deleted while just delete one\n2100684 - Workload profile are not editable during creation and after creation\n2101144 - VM filter has two \"Other\" checkboxes which are triggered together\n2101164 - [dark mode] Number of alerts in Alerts card not visible enough in dark mode\n2101167 - Edit buttons clickable area is too large. \n2101333 - [e2e] elements on Template Scheduling tab are missing proper data-test-id\n2101335 - Clone action enabled in VM list kebab button for a VM in CrashLoopBackOff state\n2101390 - Easy to miss the \"tick\" when adding GPU device to vm via UI\n2101394 - [e2e] elements on VM Scripts tab are missing proper data-test-id\n2101423 - wrong user name on using ignition\n2101430 - Using CLOUD_USER_PASSWORD in Templates parameters breaks VM review page\n2101445 - \"Pending changes - Boot Order\"\n2101454 - Cannot add PVC boot source to template in 'Edit Boot Source Reference' view as a non-priv user\n2101499 - Cannot add NIC to VM template as non-priv user\n2101501 - NAME parameter in VM template has no effect. \n2101628 - non-priv user cannot load dataSource while edit template's rootdisk\n2101667 - VMI view is not aligned with vm and tempates\n2101681 - All templates are labeling \"source available\" in template list page\n2102074 - VM Creation time on VM Overview Details card lacks string\n2102125 - vm clone modal is displaying DV size instead of PVC size\n2102132 - align the utilization card of single VM overview with the design\n2102138 - Should the word \"new\" be removed from \"Create new VirtualMachine from catalog\"?\n2102256 - Add button moved to right\n2102448 - VM disk is deleted by uncheck \"Delete disks (1x)\" on delete modal\n2102475 - Template 'vm-template-example' should be filtered by 'Fedora' rather than 'Other'\n2102561 - sysprep-info should link to downstream doc\n2102737 - Clone a VM should lead to vm overview tab\n2102740 - \"Save\" button on vm clone modal should be \"Clone\"\n2103806 - \"404: Not Found\" appears shortly by clicking the PVC link on vm disk tab\n2103807 - PVC is not named by VM name while creating vm quickly\n2103817 - Workload profile values in vm details should align with template's value\n2103844 - VM nic model is empty\n2104331 - VM list page scroll up automatically\n2104402 - VM create button is not enabled while adding multiple environment disks\n2104422 - Storage status report \"OpenShift Data Foundation is not available\" even the operator is installed\n2104424 - Enable descheduler or hide it on template's scheduling tab\n2104479 - [4.12] Cloned VM's snapshot restore fails if the source VM disk is deleted\n2104480 - Alerts in VM overview tab disappeared after a few seconds\n2104785 - \"Add disk\" and \"Disks\" are on the same line\n2104859 - [RFE] Add \"Copy SSH command\" to VM action list\n2105257 - Can't set log verbosity level for virt-operator pod\n2106175 - All pages are crashed after visit Virtualization -> Overview\n2106963 - Cannot add configmap for windows VM\n2107279 - VM Template's bootable disk can be marked as bootable\n2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read\n2107371 - CVE-2022-30630 golang: io/fs: stack exhaustion in Glob\n2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header\n2107376 - CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions\n2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working\n2107386 - CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob\n2107388 - CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode\n2107390 - CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip\n2107392 - CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal\n2108339 - datasource does not provide timestamp when updated\n2108638 - When chosing a vm or template while in all-namespace, and returning to list, namespace is changed\n2109818 - Upstream metrics documentation is not detailed enough\n2109975 - DataVolume fails to import \"cirros-container-disk-demo\" image\n2110256 - Storage -> PVC -> upload data, does not support source reference\n2110562 - CNV introduces a compliance check fail in \"ocp4-moderate\" profile - routes-protected-by-tls\n2111240 - GiB changes to B in Template's Edit boot source reference modal\n2111292 - kubevirt plugin console is crashed after creating a vm with 2 nics\n2111328 - kubevirt plugin console crashed after visit vmi page\n2111378 - VM SSH command generated by UI points at api VIP\n2111744 - Cloned template should not label `app.kubernetes.io/name: common-templates`\n2111794 - the virtlogd process is taking too much RAM! (17468Ki > 17Mi)\n2112900 - button style are different\n2114516 - Nothing happens after clicking on Fedora cloud image list link\n2114636 - The style of displayed items are not unified on VM tabs\n2114683 - VM overview tab is crashed just after the vm is created\n2115257 - Need to Change system-product-name to \"OpenShift Virtualization\" in CNV-4.12\n2115258 - The storageclass of VM disk is different from quick created and customize created after changed the default storageclass\n2115280 - [e2e] kubevirt-e2e-aws see two duplicated navigation items\n2115769 - Machine type is updated to rhel8.6.0 in KV CR but not in Templates\n2116225 - The filter keyword of the related operator 'Openshift Data Foundation' is 'OCS' rather than 'ODF'\n2116644 - Importer pod is failing to start with error \"MountVolume.SetUp failed for volume \"cdi-proxy-cert-vol\" : configmap \"custom-ca\" not found\"\n2117549 - Cannot edit cloud-init data after add ssh key\n2117803 - Cannot edit ssh even vm is stopped\n2117813 - Improve descriptive text of VM details while VM is off\n2117872 - CVE-2022-1798 kubeVirt: Arbitrary file read on the host from KubeVirt VMs\n2118257 - outdated doc link tolerations modal\n2118823 - Deprecated API 1.25 call: virt-cdi-controller/v0.0.0 (linux/amd64) kubernetes/$Format\n2119069 - Unable to start windows VMs on PSI setups\n2119128 - virt-launcher cannot be started on OCP 4.12 due to PodSecurity restricted:v1.24\n2119309 - readinessProbe in VM stays on failed\n2119615 - Change the disk size causes the unit changed\n2120907 - Cannot filter disks by label\n2121320 - Negative values in migration metrics\n2122236 - Failing to delete HCO with SSP sticking around\n2122990 - VMExport should check APIGroup\n2124147 - \"ReadOnlyMany\" should not be added to supported values in memory dump\n2124307 - Ui crash/stuck on loading when trying to detach disk on a VM\n2124528 - On upgrade, when live-migration is failed due to an infra issue, virt-handler continuously and endlessly tries to migrate it\n2124555 - View documentation link on MigrationPolicies page des not work\n2124557 - MigrationPolicy description is not displayed on Details page\n2124558 - Non-privileged user can start MigrationPolicy creation\n2124565 - Deleted DataSource reappears in list\n2124572 - First annotation can not be added to DataSource\n2124582 - Filtering VMs by OS does not work\n2124594 - Docker URL validation is inconsistent over application\n2124597 - Wrong case in Create DataSource menu\n2126104 - virtctl image-upload hangs waiting for pod to be ready with missing access mode defined in the storage profile\n2126397 - many KubeVirtComponentExceedsRequestedMemory alerts in Firing state\n2127787 - Expose the PVC source of the dataSource on UI\n2127843 - UI crashed by selecting \"Live migration network\"\n2127931 - Change default time range on Virtualization -> Overview -> Monitoring dashboard to 30 minutes\n2127947 - cluster-network-addons-config tlsSecurityProfle takes a long time to update after setting APIServer\n2128002 - Error after VM template deletion\n2128107 - sriov-manage command fails to enable SRIOV Virtual functions on the Ampere GPU Cards\n2128872 - [4.11]Can't restore cloned VM\n2128948 - Cannot create DataSource from default YAML\n2128949 - Cannot create MigrationPolicy from example YAML\n2128997 - [4.11.1]virt-launcher cannot be started on OCP 4.12 due to PodSecurity restricted:v1.24\n2129013 - Mark Windows 11 as TechPreview\n2129234 - Service is not deleted along with the VM when the VM is created from a template with service\n2129301 - Cloud-init network data don't wipe out on uncheck checkbox 'Add network data'\n2129870 - crypto-policy : Accepting TLS 1.3 connections by validating webhook\n2130509 - Auto image import in failed state with data sources pointing to external manually-created PVC/DV\n2130588 - crypto-policy : Common Ciphers support by apiserver and hco\n2130695 - crypto-policy : Logging Improvement and publish the source of ciphers\n2130909 - Non-privileged user can start DataSource creation\n2131157 - KV data transfer rate chart in VM Metrics tab is not displayed\n2131165 - [dark mode] Additional statuses accordion on Virtualization Overview page not visible enough\n2131674 - Bump virtlogd memory requirement to 20Mi\n2132031 - Ensure Windows 2022 Templates are marked as TechPreview like it is done now for Windows 11\n2132682 - Default YAML entity name convention. \n2132721 - Delete dialogs\n2132744 - Description text is missing in Live Migrations section\n2132746 - Background is broken in Virtualization Monitoring page\n2132783 - VM can not be created from Template with edited boot source\n2132793 - Edited Template BSR is not saved\n2132932 - Typo in PVC size units menu\n2133540 - [pod security violation audit] Audit violation in \"cni-plugins\" container should be fixed\n2133541 - [pod security violation audit] Audit violation in \"bridge-marker\" container should be fixed\n2133542 - [pod security violation audit] Audit violation in \"manager\" container should be fixed\n2133543 - [pod security violation audit] Audit violation in \"kube-rbac-proxy\" container should be fixed\n2133655 - [pod security violation audit] Audit violation in \"cdi-operator\" container should be fixed\n2133656 - [4.12][pod security violation audit] Audit violation in \"hostpath-provisioner-operator\" container should be fixed\n2133659 - [pod security violation audit] Audit violation in \"cdi-controller\" container should be fixed\n2133660 - [pod security violation audit] Audit violation in \"cdi-source-update-poller\" container should be fixed\n2134123 - KubeVirtComponentExceedsRequestedMemory Alert for virt-handler pod\n2134672 - [e2e] add data-test-id for catalog -> storage section\n2134825 - Authorization for expand-spec endpoint missing\n2135805 - Windows 2022 template is missing vTPM and UEFI params in spec\n2136051 - Name jumping when trying to create a VM with source from catalog\n2136425 - Windows 11 is detected as Windows 10\n2136534 - Not possible to specify a TTL on VMExports\n2137123 - VMExport: export pod is not PSA complaint\n2137241 - Checkbox about delete vm disks is not loaded while deleting VM\n2137243 - registery input add docker prefix twice\n2137349 - \"Manage source\" action infinitely loading on DataImportCron details page\n2137591 - Inconsistent dialog headings/titles\n2137731 - Link of VM status in overview is not working\n2137733 - No link for VMs in error status in \"VirtualMachine statuses\" card\n2137736 - The column name \"MigrationPolicy name\" can just be \"Name\"\n2137896 - crypto-policy: HCO should pick TLSProfile from apiserver if not provided explicitly\n2138112 - Unsupported S3 endpoint option in Add disk modal\n2138119 - \"Customize VirtualMachine\" flow is not user-friendly because settings are split into 2 modals\n2138199 - Win11 and Win22 templates are not filtered properly by Template provider\n2138653 - Saving Template prameters reloads the page\n2138657 - Setting DATA_SOURCE_* Template parameters makes VM creation fail\n2138664 - VM that was created with SSH key fails to start\n2139257 - Cannot add disk via \"Using an existing PVC\"\n2139260 - Clone button is disabled while VM is running\n2139293 - Non-admin user cannot load VM list page\n2139296 - Non-admin cannot load MigrationPolicies page\n2139299 - No auto-generated VM name while creating VM by non-admin user\n2139306 - Non-admin cannot create VM via customize mode\n2139479 - virtualization overview crashes for non-priv user\n2139574 - VM name gets \"emptyname\" if click the create button quickly\n2139651 - non-priv user can click create when have no permissions\n2139687 - catalog shows template list for non-priv users\n2139738 - [4.12]Can't restore cloned VM\n2139820 - non-priv user cant reach vm details\n2140117 - Provide upgrade path from 4.11.1->4.12.0\n2140521 - Click the breadcrumb list about \"VirtualMachines\" goes to undefined project\n2140534 - [View only] it should give a permission error when user clicking the VNC play/connect button as a view only user\n2140627 - Not able to select storageClass if there is no default storageclass defined\n2140730 - Links on Virtualization Overview page lead to wrong namespace for non-priv user\n2140808 - Hyperv feature set to \"enabled: false\" prevents scheduling\n2140977 - Alerts number is not correct on Virtualization overview\n2140982 - The base template of cloned template is \"Not available\"\n2140998 - Incorrect information shows in overview page per namespace\n2141089 - Unable to upload boot images. \n2141302 - Unhealthy states alerts and state metrics are missing\n2141399 - Unable to set TLS Security profile for CDI using HCO jsonpatch annotations\n2141494 - \"Start in pause mode\" option is not available while creating the VM\n2141654 - warning log appearing on VMs: found no SR-IOV networks\n2141711 - Node column selector is redundant for non-priv user\n2142468 - VM action \"Stop\" should not be disabled when VM in pause state\n2142470 - Delete a VM or template from all projects leads to 404 error\n2142511 - Enhance alerts card in overview\n2142647 - Error after MigrationPolicy deletion\n2142891 - VM latency checkup: Failed to create the checkup's Job\n2142929 - Permission denied when try get instancestypes\n2143268 - Topolvm storageProfile missing accessModes and volumeMode\n2143498 - Could not load template while creating VM from catalog\n2143964 - Could not load template while creating VM from catalog\n2144580 - \"?\" icon is too big in VM Template Disk tab\n2144828 - \"?\" icon is too big in VM Template Disk tab\n2144839 - Alerts number is not correct on Virtualization overview\n2153849 - After upgrade to 4.11.1->4.12.0 hco.spec.workloadUpdateStrategy value is getting overwritten\n2155757 - Incorrect upstream-version label \"v1.6.0-unstable-410-g09ea881c\" is tagged to 4.12 hyperconverged-cluster-operator-container and hyperconverged-cluster-webhook-container\n\n5. Description:\n\nRed Hat Advanced Cluster Management for Kubernetes 2.6.0 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console—with security policy built in. See\nthe following Release Notes documentation, which will be updated shortly\nfor this\nrelease, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/release_notes/\n\nSecurity fixes: \n\n* CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS\n\n* CVE-2022-30629 golang: crypto/tls: session tickets lack random\nticket_age_add\n\n* CVE-2022-1705 golang: net/http: improper sanitization of\nTransfer-Encoding header\n\n* CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions\n\n* CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip\n\n* CVE-2022-30630 golang: io/fs: stack exhaustion in Glob\n\n* CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read\n\n* CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob\n\n* CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal\n\n* CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode\n\n* CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy -\nomit X-Forwarded-For not working\n\nBug fixes:\n\n* assisted-service repo pin-latest.py script should allow custom tags to be\npinned (BZ# 2065661)\n\n* assisted-service-build image is too big in size (BZ# 2066059)\n\n* assisted-service pin-latest.py script should exclude the postgres image\n(BZ# 2076901)\n\n* PXE artifacts need to be served via HTTP (BZ# 2078531)\n\n* Implementing new service-agent protocol on agent side (BZ# 2081281)\n\n* RHACM 2.6.0 images (BZ# 2090906)\n\n* Assisted service POD keeps crashing after a bare metal host is created\n(BZ# 2093503)\n\n* Assisted service triggers the worker nodes re-provisioning on the hub\ncluster when the converged flow is enabled (BZ# 2096106)\n\n* Fix assisted CI jobs that fail for cluster-info readiness (BZ# 2097696)\n\n* Nodes are required to have installation disks of at least 120GB instead\nof at minimum of 100GB (BZ# 2099277)\n\n* The pre-selected search keyword is not readable (BZ# 2107736)\n\n* The value of label expressions in the new placement for policy and\npolicysets cannot be shown real-time from UI (BZ# 2111843)\n\n3. Bugs fixed (https://bugzilla.redhat.com/):\n\n2065661 - assisted-service repo pin-latest.py script should allow custom tags to be pinned\n2066059 - assisted-service-build image is too big in size\n2076901 - assisted-service pin-latest.py script should exclude the postgres image\n2078531 - iPXE artifacts need to be served via HTTP\n2081281 - Implementing new service-agent protocol on agent side\n2090901 - Capital letters in install-config.yaml .platform.baremetal.hosts[].name cause bootkube errors\n2090906 - RHACM 2.6.0 images\n2092793 - CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add\n2093503 - Assisted service POD keeps crashing after a bare metal host is created\n2096106 - Assisted service triggers the worker nodes re-provisioning on the hub cluster when the converged flow is enabled\n2096445 - Assisted service POD keeps crashing after a bare metal host is created\n2096460 - Spoke BMH stuck \"inspecting\" when deployed via the converged workflow\n2097696 - Fix assisted CI jobs that fail for cluster-info readiness\n2099277 - Nodes are required to have installation disks of at least 120GB instead of at minimum of 100GB\n2103703 - Automatic version upgrade triggered for oadp operator installed by cluster-backup-chart\n2104117 - Spoke BMH stuck ?available? after changing a BIOS attribute via the converged workflow\n2104984 - Infrastructure operator missing clusterrole permissions for interacting with mutatingwebhookconfigurations\n2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS\n2105339 - Search Application button on the Application Table for Subscription applications does not Redirect\n2105357 - [UI] hypershift cluster creation error - n[0] is undefined\n2106347 - Submariner error looking up service account submariner-operator/submariner-addon-sa\n2106882 - Security Context Restrictions are restricting creation of some pods which affects the deployment of some applications\n2107049 - The clusterrole for global clusterset did not created by default\n2107065 - governance-policy-framework in CrashLoopBackOff state on spoke cluster: Failed to start manager {\"error\": \"error listening on :8081: listen tcp :8081: bind: address already in use\"}\n2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read\n2107370 - Helm Release resource recreation feature does not work with the local cluster\n2107371 - CVE-2022-30630 golang: io/fs: stack exhaustion in Glob\n2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header\n2107376 - CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions\n2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working\n2107386 - CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob\n2107388 - CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode\n2107390 - CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip\n2107392 - CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal\n2108888 - Hypershift on AWS - control plane not running\n2109370 - The button to create the cluster is not visible\n2111203 - Add ocp 4.11 to filters for discovering clusters in ACM 2.6\n2111218 - Create cluster - Infrastructure page crashes\n2111651 - \"View application\" button on app table for Flux applications redirects to apiVersion=ocp instead of flux\n2111663 - Hosted cluster in Pending import state\n2111671 - Leaked namespaces after deleting hypershift deployment\n2111770 - [ACM 2.6] there is no node info for remote cluster in multiple hubs\n2111843 - The value of label expressions in the new placement for policy and policysets cannot be shown real-time from UI\n2112180 - The policy page is crashed after input keywords in the search box\n2112281 - config-policy-controller pod can't startup in the OCP3.11 managed cluster\n2112318 - Can't delete the objects which are re-created by policy when deleting the policy\n2112321 - BMAC reconcile loop never stops after changes\n2112426 - No cluster discovered due to x509: certificate signed by unknown authority\n2112478 - Value of delayAfterRunSeconds is not shown on the final submit panel and the word itself should not be wrapped. \n2112793 - Can't view details of the policy template when set the spec.pruneObjectBehavior as unsupported value\n2112803 - ClusterServiceVersion for release 2.6 branch references \"latest\" tag\n2113787 - [ACM 2.6] can not delete namespaces after detaching the hosted cluster\n2113838 - the cluster proxy-agent was deployed on the non-infra nodes\n2113842 - [ACM 2.6] must restart hosting cluster registration pod if update work-manager-addon cr to change installNamespace\n2114982 - Control plane type shows 'Standalone' for hypershift cluster\n2115622 - Hub fromsecret function doesn't work for hosted mode in multiple hub\n2115723 - Can't view details of the policy template for customer and hypershift cluster in hosted mode from UI\n2115993 - Policy automation details panel was not updated after editing the mode back to disabled\n2116211 - Count of violations with unknown status was not accurate when managed clusters have mixed status\n2116329 - cluster-proxy-agent not startup due to the imagepullbackoff on spoke cluster\n2117113 - The proxy-server-host was not correct in cluster-proxy-agent\n2117187 - pruneObjectBehavior radio selection cannot work well and always switch the first one template in multiple configurationPolicy templates\n2117480 - [ACM 2.6] infra-id of HypershiftDeployment doesn't work\n2118338 - Report the \"namespace not found\" error after clicked view yaml link of a policy in the multiple hub env\n2119326 - Can't view details of the SecurityContextConstraints policy for managed clusters from UI\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n2064698 - CVE-2020-36518 jackson-databind: denial of service via a large depth of nested objects\n2135244 - CVE-2022-42003 jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS\n2135247 - CVE-2022-42004 jackson-databind: use of deeply nested arrays\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nLOG-3293 - log-file-metric-exporter container has not limits exhausting the resources of the node\n\n6. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html\n\n3. Solution:\n\nFor OpenShift Container Platform 4.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags. \n\nThe sha values for the release are\n\n(For x86_64 architecture)\nThe image digest is\nsha256:c6771b12bd873c0e3e5fbc7afa600d92079de6534dcb52f09cb1d22ee49608a9\n\n(For s390x architecture)\nThe image digest is\nsha256:622b5361f95d1d512ea84f363ac06155cbb9ee28e85ccaae1acd80b98b660fa8\n\n(For ppc64le architecture)\nThe image digest is\nsha256:50c131cf85dfb00f258af350a46b85eff8fb8084d3e1617520cd69b59caeaff7\n\n(For aarch64 architecture)\nThe image digest is\nsha256:9e575c4ece9caaf31acbef246ccad71959cd5bf634e7cb284b0849ddfa205ad7\n\nAll OpenShift Container Platform 4.11 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n2215317 - CVE-2022-21235 github.com/Masterminds/vcs: Command Injection via argument injection\n\n5. JIRA issues fixed (https://issues.redhat.com/):\n\nOCPBUGS-15446 - (release-4.11) gather \"gateway-mode-config\" config map from \"openshift-network-operator\" namespace\nOCPBUGS-15532 - visiting Configurations page returns error Cannot read properties of undefined (reading 'apiGroup')\nOCPBUGS-15645 - Can't use git lfs in BuildConfig git source with strategy Docker\nOCPBUGS-15739 - Environment cannot find Python\nOCPBUGS-15758 - [release-4.11] Bump Jenkins and Jenkins Agent Base image versions\nOCPBUGS-15942 - 9% of OKD tests failing on error: tag latest failed: Internal error occurred: registry.centos.org/dotnet/dotnet-31-centos7:latest: Get \"https://registry.centos.org/v2/\": dial tcp: lookup registry.centos.org on 172.30.0.10:53: no such host\nOCPBUGS-15966 - [4.12] MetalLB contains incorrect data Correct and incorrect MetalLB resources coexist should have correct statuses\n\n6", sources: [ { db: "NVD", id: "CVE-2022-1927", }, { db: "JVNDB", id: "JVNDB-2022-011219", }, { db: "VULHUB", id: "VHN-423615", }, { db: "PACKETSTORM", id: "168150", }, { db: "PACKETSTORM", id: "168222", }, { db: "PACKETSTORM", id: "168112", }, { db: "PACKETSTORM", id: "168284", }, { db: "PACKETSTORM", id: "170741", }, { db: "PACKETSTORM", id: "168287", }, { db: "PACKETSTORM", id: "170179", }, { db: "PACKETSTORM", id: "173605", }, ], trust: 2.43, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2022-1927", trust: 3.5, }, { db: "JVNDB", id: "JVNDB-2022-011219", trust: 0.8, }, { db: "PACKETSTORM", id: "168150", trust: 0.2, }, { db: "PACKETSTORM", id: "168112", trust: 0.2, }, { db: "PACKETSTORM", id: "168287", trust: 0.2, }, { db: "PACKETSTORM", id: "168222", trust: 0.2, }, { db: "PACKETSTORM", id: "168284", trust: 0.2, }, { db: "PACKETSTORM", id: "168516", trust: 0.1, }, { db: "PACKETSTORM", id: "167944", trust: 0.1, }, { db: "PACKETSTORM", id: "168538", trust: 0.1, }, { db: "PACKETSTORM", id: "168378", trust: 0.1, }, { db: "PACKETSTORM", id: "168182", trust: 0.1, }, { db: "PACKETSTORM", id: "168289", trust: 0.1, }, { db: "PACKETSTORM", id: "168139", trust: 0.1, }, { db: "PACKETSTORM", id: "168013", trust: 0.1, }, { db: "PACKETSTORM", id: "169443", trust: 0.1, }, { db: "PACKETSTORM", id: "169435", trust: 0.1, }, { db: "PACKETSTORM", id: "168022", trust: 0.1, }, { db: "PACKETSTORM", id: "168213", trust: 0.1, }, { db: "CNNVD", id: "CNNVD-202205-4253", trust: 0.1, }, { db: "VULHUB", id: "VHN-423615", trust: 0.1, }, { db: "PACKETSTORM", id: "170741", trust: 0.1, }, { db: "PACKETSTORM", id: "170179", trust: 0.1, }, { db: "PACKETSTORM", id: "173605", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-423615", }, { db: "JVNDB", id: "JVNDB-2022-011219", }, { db: "PACKETSTORM", id: "168150", }, { db: "PACKETSTORM", id: "168222", }, { db: "PACKETSTORM", id: "168112", }, { db: "PACKETSTORM", id: "168284", }, { db: "PACKETSTORM", id: "170741", }, { db: "PACKETSTORM", id: "168287", }, { db: "PACKETSTORM", id: "170179", }, { db: "PACKETSTORM", id: "173605", }, { db: "NVD", id: "CVE-2022-1927", }, ], }, id: "VAR-202205-1990", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-423615", }, ], trust: 0.01, }, last_update_date: "2024-11-29T19:42:03.324000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "HT213488", trust: 0.8, url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2022-011219", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-126", trust: 1.1, }, { problemtype: "CWE-125", trust: 1, }, { problemtype: "Out-of-bounds read (CWE-125) [NVD evaluation ]", trust: 0.8, }, ], sources: [ { db: "VULHUB", id: "VHN-423615", }, { db: "JVNDB", id: "JVNDB-2022-011219", }, { db: "NVD", id: "CVE-2022-1927", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.3, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1927", }, { trust: 1.1, url: "https://support.apple.com/kb/ht213488", }, { trust: 1.1, url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", }, { trust: 1.1, url: "http://seclists.org/fulldisclosure/2022/oct/28", }, { trust: 1.1, url: "http://seclists.org/fulldisclosure/2022/oct/41", }, { trust: 1.1, url: "https://security.gentoo.org/glsa/202208-32", }, { trust: 1.1, url: "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010", }, { trust: 1, url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ozslfikfyu5y2km5ejkqnyhwrubdq4gj/", }, { trust: 1, url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/tynk6sdcmolqjoi3b4aoe66p2g2ih4zm/", }, { trust: 1, url: "https://security.gentoo.org/glsa/202305-16", }, { trust: 1, url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/qmfhbc5oqxdpv2sdya2juqgvcpyastjb/", }, { trust: 0.8, url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777/", }, { trust: 0.8, url: "https://access.redhat.com/security/team/contact/", }, { trust: 0.8, url: "https://access.redhat.com/security/cve/cve-2022-1586", }, { trust: 0.8, url: "https://access.redhat.com/security/cve/cve-2022-1785", }, { trust: 0.8, url: "https://bugzilla.redhat.com/):", }, { trust: 0.8, url: "https://listman.redhat.com/mailman/listinfo/rhsa-announce", }, { trust: 0.8, url: "https://access.redhat.com/security/cve/cve-2022-1897", }, { trust: 0.8, url: "https://access.redhat.com/security/cve/cve-2022-1927", }, { trust: 0.7, url: "https://access.redhat.com/security/cve/cve-2022-2097", }, { trust: 0.7, url: "https://access.redhat.com/security/cve/cve-2022-1292", }, { trust: 0.7, url: "https://access.redhat.com/security/cve/cve-2022-2068", }, { trust: 0.6, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1292", }, { trust: 0.6, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1586", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2068", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1897", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2097", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1785", }, { trust: 0.4, url: "https://access.redhat.com/security/updates/classification/#important", }, { trust: 0.4, url: "https://issues.jboss.org/):", }, { trust: 0.4, url: "https://access.redhat.com/security/updates/classification/#moderate", }, { trust: 0.4, url: "https://access.redhat.com/security/cve/cve-2022-30631", }, { trust: 0.3, url: "https://access.redhat.com/articles/11258", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-30630", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-30635", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-28131", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-30633", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-30632", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-1962", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-32148", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-1705", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-32206", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-32208", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2020-35525", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-34903", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2020-35527", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-42898", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2020-35525", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2020-35527", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-37434", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-29526", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-29824", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-23806", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-21698", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2021-40528", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-23773", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-31129", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-23772", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1962", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-28131", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2021-38561", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-32250", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-1012", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1012", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-30631", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2021-38561", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2526", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1705", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-2526", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-29154", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-29154", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-30629", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-26716", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-27406", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-30293", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-40674", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-22624", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-22662", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2016-3709", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2016-3709", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-22629", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-26717", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-26719", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-2509", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-26709", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-26700", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-27405", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-26710", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-1304", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-27404", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-22628", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-3515", }, { trust: 0.1, url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/qmfhbc5oqxdpv2sdya2juqgvcpyastjb/", }, { trust: 0.1, url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/tynk6sdcmolqjoi3b4aoe66p2g2ih4zm/", }, { trust: 0.1, url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ozslfikfyu5y2km5ejkqnyhwrubdq4gj/", }, { trust: 0.1, url: "https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.11/html/4.11_release_notes/index", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-28327", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-25314", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-24785", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0235", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-27782", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-24921", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0235", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-27776", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-24771", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-23566", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0670", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-22576", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-24772", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-40528", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-29810", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-25313", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0536", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-27774", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-23440", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-23566", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0670", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-23440", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-1650", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-24675", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1650", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:6156", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0536", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-24773", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-30635", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:6283", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-31107", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-30632", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-30633", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-31107", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-30630", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0759", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-32250", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0759", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:6051", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-21698", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-32206", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-32208", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-32148", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:6183", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-20107", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2023:0408", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-30698", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1304", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0391", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0391", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-44716", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-0308", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0934", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-0256", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-24795", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-3787", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-44716", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-0256", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-44717", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-25308", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-25309", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-30699", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-25310", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-1798", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0934", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-0308", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-20107", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-44717", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:6370", }, { trust: 0.1, url: "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/release_notes/", }, { trust: 0.1, url: "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-30629", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-36516", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-24448", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:8889", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-21618", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0168", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-21628", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0617", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0924", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0562", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-2639", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0908", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-1055", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0865", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-26373", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-20368", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-1048", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3640", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0561", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0617", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-39399", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0562", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0854", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-29581", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-1016", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-2078", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-22844", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-2938", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-21499", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-36946", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-42003", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0865", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-36558", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0909", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-1852", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0561", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0854", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0168", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-21624", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-21626", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-release-notes.html", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-28390", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-36558", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-30002", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-36518", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-27950", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-2586", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-23960", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-3640", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-30002", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-36518", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0891", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-1184", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-25255", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-21619", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-42004", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-1355", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-36516", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-28893", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-36085", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-20231", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2023-0215", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-20838", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-31566", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-47629", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2023-1281", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-3634", }, { trust: 0.1, url: "https://registry.centos.org/v2/\":", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-31566", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2023:4053", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-23177", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-36084", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-36086", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-17595", }, { trust: 0.1, url: "https://issues.redhat.com/):", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-20232", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-42012", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-14155", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-20838", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-18218", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-42010", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-3580", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2023-32233", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-42011", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-1271", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-17595", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-4304", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-38177", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-18218", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-23177", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-24370", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2023-0361", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-17594", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-38178", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-20231", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-36084", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-24407", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-21235", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-36087", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2023-24329", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-20232", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-14155", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-17594", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhba-2023:4052", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-4450", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-24370", }, { trust: 0.1, url: "https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3580", }, ], sources: [ { db: "VULHUB", id: "VHN-423615", }, { db: "JVNDB", id: "JVNDB-2022-011219", }, { db: "PACKETSTORM", id: "168150", }, { db: "PACKETSTORM", id: "168222", }, { db: "PACKETSTORM", id: "168112", }, { db: "PACKETSTORM", id: "168284", }, { db: "PACKETSTORM", id: "170741", }, { db: "PACKETSTORM", id: "168287", }, { db: "PACKETSTORM", id: "170179", }, { db: "PACKETSTORM", id: "173605", }, { db: "NVD", id: "CVE-2022-1927", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-423615", }, { db: "JVNDB", id: "JVNDB-2022-011219", }, { db: "PACKETSTORM", id: "168150", }, { db: "PACKETSTORM", id: "168222", }, { db: "PACKETSTORM", id: "168112", }, { db: "PACKETSTORM", id: "168284", }, { db: "PACKETSTORM", id: "170741", }, { db: "PACKETSTORM", id: "168287", }, { db: "PACKETSTORM", id: "170179", }, { db: "PACKETSTORM", id: "173605", }, { db: "NVD", id: "CVE-2022-1927", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-05-29T00:00:00", db: "VULHUB", id: "VHN-423615", }, { date: "2023-08-21T00:00:00", db: "JVNDB", id: "JVNDB-2022-011219", }, { date: "2022-08-25T15:22:18", db: "PACKETSTORM", id: "168150", }, { date: "2022-09-01T16:33:07", db: "PACKETSTORM", id: "168222", }, { date: "2022-08-19T15:03:34", db: "PACKETSTORM", id: "168112", }, { date: "2022-09-07T16:57:47", db: "PACKETSTORM", id: "168284", }, { date: "2023-01-26T15:29:09", db: "PACKETSTORM", id: "170741", }, { date: "2022-09-07T17:07:14", db: "PACKETSTORM", id: "168287", }, { date: "2022-12-09T14:52:40", db: "PACKETSTORM", id: "170179", }, { date: "2023-07-19T15:37:11", db: "PACKETSTORM", id: "173605", }, { date: "2022-05-29T14:15:08.047000", db: "NVD", id: "CVE-2022-1927", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-10-31T00:00:00", db: "VULHUB", id: "VHN-423615", }, { date: "2023-08-21T05:10:00", db: "JVNDB", id: "JVNDB-2022-011219", }, { date: "2024-11-21T06:41:46.120000", db: "NVD", id: "CVE-2022-1927", }, ], }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "vim/vim Out-of-bounds read vulnerability in", sources: [ { db: "JVNDB", id: "JVNDB-2022-011219", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "code execution", sources: [ { db: "PACKETSTORM", id: "173605", }, ], trust: 0.1, }, }
ghsa-w5f5-53hc-vvmx
Vulnerability from github
Buffer Over-read in GitHub repository vim/vim prior to 8.2.
{ affected: [], aliases: [ "CVE-2022-1927", ], database_specific: { cwe_ids: [ "CWE-125", "CWE-126", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2022-05-29T14:15:00Z", severity: "CRITICAL", }, details: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", id: "GHSA-w5f5-53hc-vvmx", modified: "2022-06-09T00:00:22Z", published: "2022-05-30T00:00:30Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-1927", }, { type: "WEB", url: "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010", }, { type: "WEB", url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM", }, { type: "WEB", url: "https://security.gentoo.org/glsa/202208-32", }, { type: "WEB", url: "https://security.gentoo.org/glsa/202305-16", }, { type: "WEB", url: "https://support.apple.com/kb/HT213488", }, { type: "WEB", url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { type: "WEB", url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
fkie_cve-2022-1927
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
vim | vim | * | |
fedoraproject | fedora | 34 | |
fedoraproject | fedora | 35 | |
fedoraproject | fedora | 36 | |
apple | macos | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*", matchCriteriaId: "2679F4D1-14EF-47D7-B7B7-2AAA1CF3FE61", versionEndExcluding: "8.2.5037", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", matchCriteriaId: "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", matchCriteriaId: "71E032AD-F827-4944-9699-BB1E6D4233FC", versionEndExcluding: "13.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", }, { lang: "es", value: "Una lectura excesiva del Búfer en el repositorio de GitHub vim/vim versiones anteriores a 8.2", }, ], id: "CVE-2022-1927", lastModified: "2024-11-21T06:41:46.120", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "security@huntr.dev", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-29T14:15:08.047", references: [ { source: "security@huntr.dev", url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { source: "security@huntr.dev", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { source: "security@huntr.dev", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010", }, { source: "security@huntr.dev", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", }, { source: "security@huntr.dev", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/", }, { source: "security@huntr.dev", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/", }, { source: "security@huntr.dev", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/", }, { source: "security@huntr.dev", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-32", }, { source: "security@huntr.dev", url: "https://security.gentoo.org/glsa/202305-16", }, { source: "security@huntr.dev", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213488", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-32", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/202305-16", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213488", }, ], sourceIdentifier: "security@huntr.dev", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-126", }, ], source: "security@huntr.dev", type: "Primary", }, { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Secondary", }, ], }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.